Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 18:22
Static task
static1
Behavioral task
behavioral1
Sample
b054753ec04639ba3806acf9a3e89e24_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b054753ec04639ba3806acf9a3e89e24_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b054753ec04639ba3806acf9a3e89e24_JaffaCakes118.html
-
Size
96KB
-
MD5
b054753ec04639ba3806acf9a3e89e24
-
SHA1
4bf07bbfbdc55bdb2126528d3d302eb18c309993
-
SHA256
0d7324b14b94cf552b29ee581a366315956e8129e545d31b9b534336a8416a72
-
SHA512
3cdad060d8af224562614b130d0cd933ef2f4a6a442e02a16b859595b1d88199cc0c48e904f51c66628228cec284ecd10cc02c6f9a0b1b25d0827bc50af6a257
-
SSDEEP
1536:xlZ3Dc6O0y5iDuA6gna8DCSPIm6s7rgLk2dmamwArjA1wCOTe9MkVvqzZteKfJ3U:x7Ody74qfHewCO2lab+mkuY9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{22BD9501-5F21-11EF-B49E-DEC97E11E4FF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000008152e4d0e5dfb989dbd5a0d761c8b927acfb92a8b425af2e37b17a5b254400f7000000000e8000000002000020000000088791a084ec8b7d29e0d750ac56d3eadb53525a408a6811767fade0237ec9d7900000005982a8af3e2929539d87367e07f3908e8a0a89cd191f384ab847edf75576e945b50e9ad90582d16eb5829b70a8b7616c459065dd544e05fa2f0a2bf0e5341fed75815535c8d41fcd77c6f04e276b243afdec58abd29a4b06070a00e6810ff14aec5986a2dbb1132a9e0df1ad360cc5acd4c8b6c0bc222e122c9f62024b30c8c64e1c0206b89658d33c977249fc9f855140000000fe7d3b8bcfd4d6c7c11f514a003b1c584b2d950effdbe834f33e6e1bab5dd8d00ab8e1bbc083caf8a322d530e6f894633ab3812a7c03c7079372513463438d35 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b54fee2df3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430340006" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000b8d0c3b514c7c08046272dcdcbd475f62c5b29f8e61d147f1dfdff348d18de0e000000000e8000000002000020000000cbe84ea81392eec90b36ad5f98fb8a9c062ecab86a0f96c4c796e921bb44e114200000006145085211f8806c492ef0f844fd8b9fe8a4b62f60abff86dd349fb9490d44e8400000008e7a84eda945c49795f8352c683639c82eb7aedc605883101132a2dab25d88fec1331b9b31379bacef42258f7951bf22bad4859852157421f1ecb28af97ada71 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2652 iexplore.exe 2652 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 3008 2652 iexplore.exe 30 PID 2652 wrote to memory of 3008 2652 iexplore.exe 30 PID 2652 wrote to memory of 3008 2652 iexplore.exe 30 PID 2652 wrote to memory of 3008 2652 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b054753ec04639ba3806acf9a3e89e24_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5568564850b21d15d8ee66873f1a10880
SHA12e376faf3074c5d386f556967b334214c933e4e1
SHA25674445446cb3f5744345a7a49ff9db6bcb9453634f6b15deae9aa8ce4e9931495
SHA51260ec76bacfd3149313254f26767ecd7e0f43f659cc0c1334d64d15afb8fa178e194d469cecb005f50115b54cb099c06295b997aac5c8a9da707c61571270aeaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d0ffef12ec5f620485daaa6c27c1df3
SHA151b5a9931f3cc38369eaa113193e78dae465ec67
SHA256cfe28fd6647b03193713ff71e2a4df9540de1da112e42e55d140f354ea17f74b
SHA5125394246b9b05b1fb5469868a357612c07488831c0f955ece0d88ea904a84b0cdd7bd7ce5fb392d900f1f0d664e63ba91f42a1ea7e18a2197e0a018d3439a4141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56017d473ba5899a6fecbd27fa2a90a7d
SHA1c9acd3a5bb415d67f540b2c2b071841b4ee354f4
SHA2563337ad85a0a3c95b4a06999c19ea1365fb428535334a9e7b823366cb3a729360
SHA512fa340af5764d43ca065717b2bdab17f4ba1fe4cdb551039f9cd14f732ca9ab69da1099a51b214d0a25b4d83818304e739daa9d13ceec2d62e12fbd246b0898cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c76521b73b609eb57b427bd2f9b537d
SHA1d67fb74db153e66b6f2b5beade95d77bf50f152c
SHA256cd8e0b6afd48ad28423b5926125887efff56934192bc409123d357514d675f87
SHA512c518e8a705eecaf359e58ddf75354a3719db9192c46a5facd0a623c175e058bed5b7202bc76029876c66b5f2afa291d760dca08ae1ccf8059a6c320bcb93d1f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be56a5938d3e8f7505dfa6497f9e3ed
SHA15ee1fd03455d4936d40d5e0da6ac99d14ebb64e8
SHA256ae00663ae502f241ff01410e36545bf2f5227c2209812db1bf3f1596db3ee903
SHA5125662c788b3b73bbda35733fb600691af50919655ab0ba331860287fbc37c898185c7849daf19d78adfab1319abc48e3f8e1ccd0ae2998c9303c0637cf7ac7d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5721da61f91a781d94923a27620debe28
SHA1faf62ba29d5ae4623fa480f8319ddf42484ab19b
SHA2563b2cbb2f2289b39d3ccb1c6d1b1b88d2a9d0dbe961d96baf92cef752855a7814
SHA512671c693ce94201f7b62afa3e172f5690826451fc5427dad6ebccb12ec2c2a32392e720ac96520557fa1928607b0cfd412856b6d8afcfc47cb99f1147eb0b6a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546c27e8f82bdf89a440ffbf5affb208f
SHA14d3589f10a9fef82980bde8be6f88c443bd77000
SHA2561108799d141831f4813eb2554ba25c4cc4eb2f1ddec049eb3769a4ffa84db1af
SHA51296fe4a5a484af0cfd9bdf887d89e40504d2c4c934ff544fe46978717458f452bbc3c04cc980e148d93f2ae5be3211f56b3c320a02c4ec069a636b512d468dcc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5018ca5d44a18e90ce12c08007046de
SHA1b897b1efbfbed0c1d96354d48f7e10227e4f642e
SHA256206fbf355b70abeecc7d1ea4fe356e221974be0573b418d9eee5cb37e0b7517a
SHA512f030ec7c6f23ee94df91e5863e47ab59f0736afc97d14ffb1bdc07736e125a8fcccd68e6e7b49eec712ef4dad91d02a01709b4fd620a8a9d33cc9644a4a39d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d6ca1073666d890e11bc451f85d4fa2
SHA12b19ca32d0baaa5cf8ec4399b4d1596234f2c988
SHA256d31396979458035b0410dbeb0ff60b3f90c79e030047be75931edd7fc4dc08b5
SHA5128d9d56c513e5c821af19b9b025ce2609b950f802e17188a83ab85abbdb4918514abfde4e5f7d92028cf79cb13641ac8eb9a38bd2ad7548d1fedef710df420e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ce0acea6e5074d83db8c4a2d6f6bb6c
SHA12681ab41002517295b21c42f4a2f06d21d1c2216
SHA2569b32f3e65a8103eb81c99e4e208726ff02be79407e6e6380d88c6057cda56ba8
SHA5127a4f6f98277a5e5540234ace3c539a97fb33238ac1d094fef967c58d398efb9d5bb46d4eedde300317bfe0a265c18ab2d93560034b92664ea469b6666826e685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5443ef4d7097842d59007baeb5606b62f
SHA17c83949d9df9dd8f6f2e87be418faa16d8f0c97c
SHA256b893c03104e01d5ef3b198b8c0d27c22e095158de62507e03abac0e0a133d956
SHA512b7ebe64516ce51ed307dee1f56ec813a83648aa062da3754444944b8a2b3fbe8551185a8e39afc58b852eb91348ce28dc991b2f45999b7d3a9da70484f065e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526b23fe0aca659a4f5940557f94809f6
SHA172e98c9ea1022abc4a074ec36f70d8b0105d6e6e
SHA256283cd0f2763f36bb66456fc6c7b43f06947cb2c98aeef82018465f21b4488ec2
SHA5124bd058645f184d298761205acd22d6208df025a0a64eebe2486bb56ed32aff2c9ae3bfc0afe02b6863338101d9d8eb57bf2c54f88ce6e5eeda765a44bcb4018d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e81d4844f7603c5e2394bc59901731f
SHA1a3c20539484b4c12cb0a41384d361abc04643785
SHA256a79852491588f748ebcbe1d7c0774cb58eaef7e279bbcd56a90b5991ca70064e
SHA5120a854b9a5c1d5a4a3bf0019f983266046c3bda79c532cd49190ab47995992131221d0f237628d8dde4efd8829c7ac5444954008ad9e8557cd81ced2d7dd80173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5341ffdb9061aa9fe5d1173b9250b4e5b
SHA1506c1ef7e32c57900959a7557b539c107ee68b45
SHA2565e7150f3803f8b114c7aaa81729054c9bd937f8a16b70382d61670988f122811
SHA512456ed99aae51fd9cf8fd82bbf765abcff07270115e9a36e48d33b30dfd7a4ee1664a97ef7b2e5ae9a597dc21a1216bb005f713949beeb1b055c6e39a769c0db3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b56b89cc722f93d6318be986df3e4ab3
SHA1f6793092de28d70248eb3b6ad165a372631006ac
SHA256f247be53850e514f12dae789e4c4d5f5c132dc4474693a1e679ee906f7e7b048
SHA5127c6aecb1f14e15c641d6ce570dd61aeb9b7d21d1eff901f56d8c8c2315adaf186725c406bb0200ca2358b5a11262148fa67325fd80c297f9289e7e8a930966ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5422b94832efb16ee1c43f63fddaf6361
SHA1f82f1b4cc5ef12de8b6484331917f1139d5b5cef
SHA256c55b813548fdd315a97dbc5205f6cee7efed8f7ed3f9d5b4d4b4b45795715b36
SHA51200bbae4ca8c6520083739e4856a6c716598a90412cf87d6ebe08d64d23ec41f60c437ad7dfee689c03dfe966ddb737671603c8fdca3d1617797babc6a54120a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c6a0675b6e156f614319a65a34024c0
SHA14cd81c5cacc3d850bca1663059b6edacb12173f4
SHA256c0db739b226cff72670e101fe3dc483adaa3cbbb4e002d84159f0518b8c652ef
SHA512b9bb0ed6edf07898294f575232c28e6ba99cdb8c37f3cc892a06050e314abe658f566c7701fa5451562ab43f600ced552ea7d229af2d9efd1f53644f263775e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d70a531382bb2ff60cf06f3ca0780ba0
SHA1bbbae303dcb6e2e639673b39f44cc6f8fdfd202b
SHA256cc2ceed2513ff6ae0a32c44e9e617ef314fa7eec44cced29abbcf9661d3a8c30
SHA5126a7f51678c525bfbbf8e5d18a338c3d436c2251a14981edc938779b0963f4a214ba97176c43a90ff135e3ec5e8a9dea7c2b2b6aa6fee25066fe8197d3d864674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4b8f65894f97a49e8ac12e3e23f1e8e
SHA1768ae07386a9e50d9c08a79dc01be3ccab95aeda
SHA2562f51fdc85e83a91a7b50865cfe4aeba165f33f6542c0e2c53701b234c19f5e4f
SHA512d2b745ffd9b290721a3e220fc582547e5ecd67e6f6dc27b5546c695666776960a0ebf127263650c538ae9642df429f448006829c18763e2217c49f32d32ef73d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b