Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 02:54
Static task
static1
Behavioral task
behavioral1
Sample
ce7bb13d6b4f0b4d38019849efa38899_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ce7bb13d6b4f0b4d38019849efa38899_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce7bb13d6b4f0b4d38019849efa38899_JaffaCakes118.html
-
Size
139KB
-
MD5
ce7bb13d6b4f0b4d38019849efa38899
-
SHA1
772387c34b8acdfaaf59185f7d64b34b13debf27
-
SHA256
65abbcfa0292d9659c3a3b16c31097962a891876101681ba791eafaea6ddb692
-
SHA512
fd320c1896e0bb2025871c48c7c8c7dc5d2b3107f26fe16f615739618a66955a5ea96c06f5609effa5d2e73a875cc36b5913ad8d755cb71996c9459e1f2e8a97
-
SSDEEP
1536:SkNr3VaYSliMnyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:SkauMnyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 407242710800db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000014a6dc006b72d267d3a7ecd40f4f2e4857afa64d1344b3973f5a63d5444c6839000000000e80000000020000200000003d08df89476e17a71cbf468d2187d8736e9969f2447ec1e76cef360bb322ae2b200000006c28ad8ee349b76e50d07fb85dc42c8d753ce2a11dfb05d07306f54e1150665540000000b2e4f3f6f3b260219e2a773a2e3cb9b1b24c401216d9a2ef22ccf037b0948769ea93918929f392594338d8e5c1744c08d5ed30ba8f21173146f9f7a8df8719a4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B32BD71-6BFB-11EF-A429-7A64CBF9805C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431753145" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1520 iexplore.exe 1520 iexplore.exe 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2152 1520 iexplore.exe 30 PID 1520 wrote to memory of 2152 1520 iexplore.exe 30 PID 1520 wrote to memory of 2152 1520 iexplore.exe 30 PID 1520 wrote to memory of 2152 1520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce7bb13d6b4f0b4d38019849efa38899_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540b28982cd8c63f1cf71345b5d099992
SHA1a739f189988708df9a8124c0c756cbb1a52984ab
SHA2564f0013bd5da1ff656ca1c7b25ad34d9d137ccae0e636ce561cea3a95fe78804a
SHA5129bef7c1aa1af135b91fe5bf9d37f89ce57413ef7fbbba1a1717eb0c9d7fa809ca9e5b2ca4c62adb3b36841377c09eae6d8168b28fb767fe01e5888d1fc6d950c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c933fe5c7df899908e8ca698445338ee
SHA19e20d45279ad2f8f15d1d1928c5183704752a188
SHA2568b59db5d648f96afd5634e3099054fb3be0ffdfb565d061ef0958e1154af6eb3
SHA51241c22124e37b2e96b6de29ec5d0f7e2097b5fa504ab51201cdf8f16ca8d76238a54d538de66aa01846cd897685895b43ccd1e5cd0965ceff54cf7c1940829f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe950cef277e606a8913da698bb067e
SHA1e8671c82f90c004dbe4cf9d13bcc29a3d9ad29cf
SHA25653b5427190bb8cfac3da76cb072f9ca9d5f0ce19d026652ac3ad3097d7455a9a
SHA5124140302022a3bd9bb73d301f1de6b8b443241e30dbdbabedbbb6fb40f9442deb83785419504539f520509d7d40be7c56bf26fa18b7df4f7331011f29cbe36722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576a177c2ea9240e39935c486f28da782
SHA1a1ba520105a0fcc560d87b936f6d5a1f08044302
SHA256b5282ebb9e23e717ac3c1419fd9969578c5ede2c2420a03e4a948e4a334e9af2
SHA51246ee79479377f6b36ba8dfe3926d90e9f35c5d7d7efbd04dc9b2218cbfb8b914a8386786275078d785ae7d866756b7b177d376a252e60f1b08461df58c6d476e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c53c21227974a90e37b449f14c99a078
SHA16ac7c16da3451b14c7530eb15363c67d0ecd9615
SHA256f2b39b8afdb1cc8c39c0f4500b6085a55050af34d3f0c46659c0472f10431233
SHA512957583f02fb7f760680eb752a7ffed9b0b56b8ae6cbac5ef761f869c82b150950ed42522d8a3f99df98bb2588c6cb94396665351c0f03f2594c6a49cb479b87b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c11e424838919bdee7d5bdd96bcb7eb8
SHA1f8114348ea6ca3ea1c4f223cb1758c8f582c3f19
SHA2563b5ba4598b44e83fd216e4a2af5528528a58497f21b138d343770fb67c843e0f
SHA512b6c8e1fe02444913435a6fdd7768a3d08d69e01202a66cfe1aebadc9653d70efb68f0043c3a272c419fb2742a7088b9271dc9d7a08618cc1970c3053fbaba7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d509b6b9260f96478cd1527ed77662e
SHA1369e337a5e191cba875ee5b805d38a8139652c58
SHA256a5066a48cf2ff1736ba399d3b817f545bd8554edbb6ed852db6a99cd2f27268e
SHA5128a49c27711f74ea765550f0021ec2b46453fdba3529b0e5789d76c604d9f62037bdbc90f94153df9678cc80301cc0466e463958bcae60d66adb57c50f7267a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2489dddb6e933c2b35175f7c6d552d8
SHA1b045cd15d0c1760607f09015bbd00eaa6b7712bf
SHA256ac93453c1602a8a974b713c9db792400fe68075e927f35732dc30d68a150d2f7
SHA51273fde123ae03463ad0fa36dfc2735331037a2328a3add09fc67ef18e25250d2d0384ae342ca83a41931edfd7ef9456d312e74b2dca948a7ec407a8f3acf267f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f72f5329062e31eef4c7f1a59178940
SHA1ed2f8d6b0fff5849feb790b9b1a1a03e4183d3ff
SHA256a90dc4cd198724ff6ad6d3ec2ad791730563e9629b1b7687271992ff35dd2586
SHA512d7bb1ce9caf6207740296f3496cae9927ffac6a83d633c934b8e52ac2a47c5362be9235fa58c19c98c67da12ecfa31d04d947778ead1f693ae5d4161106f527d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545c9459ea652a2730e74a17146c4bcfc
SHA199072e5975b92d4cf2d36fb896a4a1c96f548072
SHA256aa41ff12c2aaa38f70d34b80ba020d87266166cd98791bbed2daa719a6fb461c
SHA512b4fbd9e19f2d5592a91ddb56f165869a6b5879c7e3f0decbc55fb6819d6262c5cb3c7eb3a50b9830aefcaf08137a51aa22c9c0cdfd2d08d7d272f52658e13b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521a9496c544cb2d6eab0f763706d1c5d
SHA178096c74da6071426f7a8fd62510ce9be9833fc0
SHA2567a04f8cd414642eedcd0a2840c1108ba147039020728675027f178a94d6ed216
SHA51299e1f683384fd51a39f913a780fe9c491654088e39f7bbed404db21ec17b0eff8aa1361540bc88dc90c348c51f2a6e1df0dd29a489a74b1833be6322556698cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7fd0d0e330e67d143a0647e436223df
SHA16e10b872077daebef9875b9b0313cc4667cdd3b6
SHA25648206cf46b3431cb392f778a5dc6b4026f13b1ee8f2899441b86796c855485a7
SHA5125bb8d59032692fc037e7222081fd428775ff051f95472d8d7f50589a824471481133d1c2e7089be754fbf6ecb25a5152f1b245901463d9996aebd82bb0d4202c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5804788363102e459d12e485f2f78067a
SHA16364ac54b9e9db7b2d2695a8d04adaf38744b71f
SHA256b7cfe8c96ec4aa3b70b2995a2f92a667981becafccf9f37b154f2c8cdbd352e5
SHA512ad67f1a53d81e4dab288aa0421207b77e2e3f232d326757592c710dad7c392f65cf1a5d0e0b0eb5980d71f442d9e84b948ab7810583801e75a054681bdb1b339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e247a266da04ab17345a6f37fd7298c6
SHA1b979f3fc712def426bf3b0d558f98c871b2b3941
SHA256768e1756a31c4f30a2ed486397f7b26da0079c71e2e5032420f4bdd3762b45d6
SHA512059939195ffb5211402d94679a8338083e18259ccded722cf9408f15e52da72390447a514cea5a6813524d79c653163148be32aef1ac175b2d078c231cecde6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c08458589dcbc83af74e97cdf22950e3
SHA1c66148da386fbc1c32ab993643ea5e0db7a2ba34
SHA256d0d41c97a9a8a5d2a2ccf726b2ee2f9d49d38db2b754b66ad1c0db23b733c42b
SHA512818db119fa510adadbc427a8258a3333eacf9fb3d5a2ed4e7de1d2e0e643c5fc46df5f47798bc94218d9a9c1688515f688e53c3d78b86a8e3bc539522d123447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e9ff5ac1e77e96e8706867f4fb6e63b
SHA17d3a97125ae976cb29cf006c95e0ac7d927fdf22
SHA256d60aae875709f654965792f8ad0be53347f2295d39c5a02a091efd241788a9dc
SHA512620ff0de4ebc1a4feffe72cf5f684ab336dc260e98b71980eb5422175e150acce1d91f0bdd8ea7ee0255703ce99c74f080cf64616da1e861e7d41c6fc5ca4f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c0159ed20309505342a19526442c8aa
SHA1e8c88118c2c928c27ae3467699561a18cb7b067c
SHA256f3b49209000d0957a1f43a64eb081804d52752f68b3984f13e6fa04fc9d75bf9
SHA512430a47e4fff2642f87c38cc73bba4de04205b6f1e8931ded3ab11893b3e22fe1d8c38056e58e991b88a4df867bb6d6d75e87372095a35c173fc1b01b1165b864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da64dbe219998171b2b77610badf6bc9
SHA127dfcbeb149cd0e418e5f0ef0df3367571f5d851
SHA256f06609d14f0b021b5e772fcdc986cab490769cd0f0092452f3a0421763ad13d7
SHA5128569ac166326fd600068ea1473f4465eccaaf1d26efee6d1de500b7d2746ec2a3b1323e919a768c451496bfd78087854da4ec71657f8e88b4b411c11aaa1bed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b9c7263a69c3d025688fcd1862daf4f
SHA162fe5d88a5e4497e95cd5fbdeb0c15a57a2c7b7e
SHA2569d7e2b7454934dad55031506383b9f72f3c793dd2753d85a9b28cf61c3e62880
SHA5123179c6185dab125dcde793e421a4145ba1ee23215b2d1300341ccd145c7abcec81a8abf1267adf2a996ddc1ab5f4cf6a9fcdce71f1acbd86d0d9de6f4f6259d8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b