Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
239bc1c2fa57fc7ce5dcaa51968961c5_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
239bc1c2fa57fc7ce5dcaa51968961c5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
239bc1c2fa57fc7ce5dcaa51968961c5_JaffaCakes118.html
-
Size
11KB
-
MD5
239bc1c2fa57fc7ce5dcaa51968961c5
-
SHA1
080c89b83d6061f2b58c7d5630a41198af9b5c11
-
SHA256
d0535481add5f3f8e8ffa91abca5008ca4cafcfe0a2091e344d1e5aa02e9f9d8
-
SHA512
545089fd1b8e1faa9419632d70af0b31c843fc084a3cd350425297605cb251e3f0bdf9c186d29e610801563fa8d27049d8863b1dfd33eea8d525cdd9d0c942a4
-
SSDEEP
192:2ValIsr0r57M4sxaJT8Is/w1wvqa1bAuBuLbdU8d:salIcIQ4sxahs/ggbAguLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000c92fba7c4a7962d8da6977598f1bf135cf12ab4df7b3c0b8f97d486608c9e9ab000000000e8000000002000020000000d73753873d73bdba4a10cf0e1c6cfea32c6410e1d587c763ad70263628fdd455200000002b45fbf7eaf79c9455efd46ecbaed3b00d0a83b69f3e2ec6ae3e50502c54ac5140000000cb701c891dc6a20c93078644523faf5798dfc9c282a4f9c532aed728ea455d168ce4d622ffb4370c10e69504b7adfc7b2f6b32a6e8e2f5ce38049b6caf3f3ee5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426206542" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A2B0561-3989-11EF-A381-7EE57A38E3C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40da7c0f96cdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1572 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1572 iexplore.exe 1572 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1572 wrote to memory of 2576 1572 iexplore.exe 28 PID 1572 wrote to memory of 2576 1572 iexplore.exe 28 PID 1572 wrote to memory of 2576 1572 iexplore.exe 28 PID 1572 wrote to memory of 2576 1572 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\239bc1c2fa57fc7ce5dcaa51968961c5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1572 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adab340f50ccbe3255e54ff4c41b15a4
SHA1b1e7a7dfb56237cddd230bc275381e4bdada68a7
SHA256c5983ea84160dae9c2a33237e14a8bbf16d03d30653ae81931d07084a52effec
SHA512f4e8c0efc93f97854278d038b2e44b6f630af0c91103898ab63a39d9da67ac0c678fa1de9982fc05bc51e8217995444db79ab9fb94535d52f2e896e981601ea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d734caab8ad7dcafeeba2639ff479f8
SHA1bc987390724ef8f05d0af05475535cbe81f6a8e8
SHA2564beb25f1302b1f36d4ded7b03288dbc071bf50a4e99f1c4c230b322edbc65fff
SHA5126b741366c4d61d9f8a767f133694b4862d11d3b42185ab442a9f5662e2eb684dfa2ec22c3a8dd8e6f28000202c6d8eb33b62a99876a7b26859c98feb266d0acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e6e66fc557b9ada48595e3de3c794a9
SHA12fec557b57ec34857e86888f3cdc364c0af07f48
SHA2564a9f17fc2aa4b203bf2d016fd3de3e4b4e4ddaf974cb834a7e623698defe482d
SHA512f1b205d8e767db5b95ca9a02cd4aea5ab823a096b52f6dfae132310ff0ac393d085d6a22dba76bdba2b2fa08da0cc8302bcd286c39e354d778785a64c49aa090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565137d2fe2e9b96770e3aab27d25dca7
SHA1b6b243571413c254beaac324f96cb6c3e725e51f
SHA25689256f60bff2bbbccc4472392170a666902515b343f315df9d7490061f470561
SHA51244b80d38c70022ed6419a99fea012920d4b468c3a54cfed6558563ac737be9cd6df8c394fccb76b5c138de592ceea82a37b0d6390cf5956ca83fffbb9b92cdd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555319e358680f33714619fc22ae67bf3
SHA1cdc8e8064a6f2c3b577c338d1274d8361bfa6230
SHA25682fb951967f599b708e1bf95d263d824337257781d7fc2c44f3f516715f2be6a
SHA512cf8163bf69830f2b10d3b25cdc4209203b53bf407d78aa7addd552d28d9a505dd1e95747f9343c8a8ec4a7b20b6eef87e2106afee6f6fd41770363bf005e1cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbd3900072e33987849a0f598e99571f
SHA17e18d37f6396acf232fc826456761b009374732c
SHA256fb97f4510ec0d3a50da82dfebd12d962b5434cd5ab9018b3fcc98a9b275f664e
SHA512db090fad011172dd4e1c25e3c01f36e1fc7a06dcb8d295ca7f92e2d9f39d6afeceec451a16212b17b005c667766f0b300f686674f9c35c43d571e3ff88d65b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f3ca2ab8ad2fae7c2333cdbb713d453
SHA1a32f1cdeb641af11ccb7aaa074202a625868dbdf
SHA256c91eac1a8edccb748063313bdf36998d0861f6e4537e8951cd8c1cf9d3224faf
SHA512483a830b0c2698dd1b51912fda08db087baa362ddce7bbbefe61ed4ff89286c0628a323532f5f9dc27439cc6d99992d0e4826997e824e4b1cfbf0004d56a8383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524c45a65e8c93cdf6f48784ea5feeea3
SHA154c77e799d40e5821b0373d8cd4525aafdbe213f
SHA256511c4a69b50d6d88b2ccb149a5fc5b00ed64fd6611038b452fff74d0b2876269
SHA5125ebbca7e2d3ffa54063976ff2475b4acaa5a214bfcbb30c37f30cbcf0ce23b5b6260c608b83258e7fb7d346edd16898994de0457ae22bf37ee91690cd83e51f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a5180c3204cdfd75ae4d86bfe68e6d4
SHA1a0471643c40b7cd8d512e7e73eff2935265c1061
SHA256ef9462aea9f13f862ef5feb9b3c5e20cb4ac89e89490ed762b23ee84070c898e
SHA512c2080582428f20c4b5622586133de936d7d7e7274ee424771d7f327f4fd8ad6afe89be1fcc44516f44f4ecf91b0c95da40ee84a3340347e8b0f33c7463b969a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5102eb9752759b38205a62028f9fb3715
SHA16d3d5aebee0908a8027510830b0b753a1a9be9d5
SHA256700eec07e84326d86076333c0c878fe87ecab48e941b1eb3761084902e2bb727
SHA51218bb2c28a2322243b2cf60c42ff501079bb140d921f88f796befa68e1d491af910023aee556fbef5c36e9ee6a613a1202bf7fb935fffec5ea6d0e2af5672306b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbc6c3b081ed086cf40b2953094e85b6
SHA1ab51a82053ed5342b7fc56644cf3a22e3cc0d8be
SHA256749ee693b68aaa2f15ad31d1c2f9ef2c3fdcef0fbc38d8600a5195103252f03c
SHA51297488874296f3f12f8d950ce25083a1ddf068c70fe6612b96bad07d91b3da6b6d5afecdb54d14bc58f8607a7d1925ca55b6486b21d7380ae0c4fea673a68ceb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567c5929e6a614cb5009f511091d3e312
SHA1c0b5a6ba581c3cac41c2eebf49f49517b20c76e5
SHA2569b64db73d9ae41f09e5329a7c1971f5f7e046c5d0cdd14dfdeb5d9e5d2634a06
SHA5121c4d22530dae11804a091a528a8721045f776183625c7433ab236428cc77a592c248174fd893493ee155190c60731a0f0b648ec161cff7282f379840f18da06e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e69e435e83bace9fff71b87a57b0c5f
SHA12e07e00c6ad34414cf62b0c3189214fe15069073
SHA256b5bd75f3081c642ffa29b6281bf30bed99c71b54c3c670a6f1523738f23e458d
SHA51248ddee7330e3cab26e880738667e35a76f09e10ebb24b02aaa47e980accba7efd7623948f9880aadd17fdf5f8513eda099a8cfb36608072b19bc178cf75aa260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52765d21f6ca5768ccdfade149b421930
SHA1e0188508a14942fe7711cbc1767647d1e38fbe03
SHA256911baa71764e4a5bbf0bc75d7918742eb356e7fe76dd7c3c1e3368326053b329
SHA5126bb7aed4670655fee07f575c4eb0368dc7c40aea258d55a533240f26ecd264b26e4ff04cf953b5a4ff44ff93ea5c57fa7b35b30c0efb926624b89fb1e9e04779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55300e3d33c767d7f4715bb558b314535
SHA10208c4e1e61685d9e4084a3114bcc0073b70a015
SHA2565ca56c9a4939efa2ed72b2674c48156193c1b78e4cafb4b22ce28f3bc575b479
SHA512ea1f89a5a4970aeda669f096630140696c9dd43e93a9c8386cb7e532db303c0e55a16e2835b17bfae891bf37acc29620b7cbb31c582ee1832f7b8fdb47a780fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4ae710c1b558776d03ec00991fbcbd9
SHA150413077572f523c9cdc5c9ae9e16874982c51d0
SHA256d4aced26d195af4bc79bbb44f61af501127fac24a0c3246a817ea9d7807a4310
SHA5129016309ea01f1b0a3052a1fbac32f48547fa9f3641b571f97cf54ff2e08f2d2dc42e3aa47a11bde07e3c26a095bd2b19076baddf16d7bab538985ecf67204e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52306bfa512c002dbcaa26068b3063c68
SHA11fcf71f00fe5f26d31d96546e4029c556ac80a10
SHA256c5a163e7775949d036efca75606f4b7936c97b167af977b0283df417e7a51cdd
SHA5123be13ba708360c6d8883b5e685583315fdc7c94de7a8d13715ecaf9071bbe3c05ee84bfc966834ee98db23b38d1460701d268337aa8888b2573b1f993762e1ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b60358544166aa80c1c095ddfb9270a5
SHA17db707c2bb13142eeb37d1a898e717f4fca0eaf8
SHA256972bd20b0e2fa659d968d34d10698d3dff5fd21ef958df159a7e189d627eb002
SHA51267e1d1828e3484a61db307e78da9d25fd554b19955b024d183b8b9a307f6abc719a1f8928129ff2c6ce2a200fddabc5e784cac350946fbef3aecc97a3776a74b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbb3fa9110928410ae45b03e70d34667
SHA1bad01100a38db387dc735489c3608b4b440b10fe
SHA256f1d161745710a94fbfd845ae89014d1f0939b338238c661c6376a9e2b7e5bb43
SHA5123a6434c9168d83821247a73833c38eb004ddbe5d6640f9a4d5b9077fc21ae91843643005e74fa3346e1c09a85d89cde28e56c858278cf7af60c8b5920350d432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b356aed28d92a63993283c523fd414a
SHA1afea9cfd4711c44182a3c08b7e8bf68e30c8aca4
SHA25639fbcab0847f2f123ea48f7ff5c202ce79611f76fb0032d0f9ec9c64fffd44b6
SHA5125f5d5655f8e3353447cd1532fc811f23bc7a68a0f1a7d34785f474de9c703ec9556a01ba3cd83f6fc7ac3b435988cf3d5174bf839ee2b58a50e3a8314a95315b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc1bda527f53128a6fa4ddb7e9d406f7
SHA1e4a1fd5a306460eccc2991bf481c897094648b67
SHA256cef5fb0f9977b97661ad4db08b7a869e721e836fce52714f7965da7d58e40314
SHA5122395c9e75d2623668ee88ce8daa5db025752c0f1be93ada253ed27be2502980b1c86dd4067513d25f817ac26a181c8a6cbc2ba6ea7daa4c087f0574c969115c9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b