Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
cf7454b4367e8b1e5a72df78f4d10567_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cf7454b4367e8b1e5a72df78f4d10567_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf7454b4367e8b1e5a72df78f4d10567_JaffaCakes118.html
-
Size
4KB
-
MD5
cf7454b4367e8b1e5a72df78f4d10567
-
SHA1
7c8ee36e4a64ee6f5d1b050cdbabce08c176fd91
-
SHA256
07550340fc3caed4e444f3b2fdabd8b014f2487c316573774594c608bcb52492
-
SHA512
00ef8a00e9e6b0d636ca909fe56d13462fd6f80f45fd8bfa155d6a6533d74b58f5cf95d61ae3966fbfc5a94f4f3c69a4ad5ace17e7b099b8f52cc3fd1acfed88
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8onDpiuGv:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000404b03ee63dfcd8590be4aaf706b00d75c666969a90a31b99f76373c4e2eb234000000000e800000000200002000000024f57c60a2517624b7c27687f79536e27399dd5e2b0d88c5a4fe07acf52b0c7590000000e21f1c017fa7f19628f00b87bf535b732750f90b805e3890487c08b5bd906d1fbc1126a573fff47542ba8caaeab95f9b271cfca775e0e218c78c351f374105e07c460f68db7c21e1d9fff1917f5baeab6683aadee1bf7ea04fb45b517308de7d1ed739bea87b244b912bd33c4027c4c837d873460280812d30f14bd1b3c13f04ddde0bdab2faaf7b75449883a42e131440000000176faac8ae589e70b29c77e7e55b7e75661f1b06725d4e9727c0af9c8220bc01b500836b64f2e673f5f1508ab4aee1291b8583afd293332527cb8ce2382b1d88 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431785096" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF8173D1-6C45-11EF-98A3-428A07572FD0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4093ff935200db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000080d06108f31eb877e5c7e0b711b4fe3b5159954ef5a8c1ecb9187e81250941a3000000000e8000000002000020000000361b1f71a5999dba52adeeeef0779e64b1d05df5e5cde46273a0623a9ea384a320000000579cd4ce8d4f7e28e0dad94e73885d3a63160337dbc1a686e813807c4bc53fa840000000518c5a36b2e0c5b0017e995cb83be3197f4a1523a203758a6f2c587001acdd2f1564eb916075e650afc9b8b67eb3101c52e524d1e0b9840ea7a0dda41dd79c71 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1040 iexplore.exe 1040 iexplore.exe 812 IEXPLORE.EXE 812 IEXPLORE.EXE 812 IEXPLORE.EXE 812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1040 wrote to memory of 812 1040 iexplore.exe 29 PID 1040 wrote to memory of 812 1040 iexplore.exe 29 PID 1040 wrote to memory of 812 1040 iexplore.exe 29 PID 1040 wrote to memory of 812 1040 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf7454b4367e8b1e5a72df78f4d10567_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1040 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e86e564dc3a1201b09513d5d655c6f8
SHA10c0d0949a25a9c03f7c5052347b173d546c9053b
SHA256788b446e9b09e4c07c3d4dc81b6b29b48e187f23a6acc671db117d2fc3200f53
SHA512945323b4405342c92d1a2bd861280d97845daff3504ca7067941d540a454efb01d2cc16a7b4409a9551f540763eac882091c906f5a1e6be4bf05b123f7aab786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55096c1128961272960f527d6d9369b3f
SHA1ddce090ed72b2693a755cc53fc6b4a57cf0ea345
SHA256e999cbb5cf9fc935f7dd7817db98cfde037c28f9d86b81469c9faeab0d81bdb4
SHA51288dedf58c6475292a2d40977f2d567cbc68eb909bfe0d2345496a5c55aea155150443d4759f32d792b4b4873f90b454dfe62f494d0a23c1f11264e6349c886a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50257e6f88f0f150c90015d2e04095fef
SHA19ebfb59dbfc04f21ab0ce2c68da1d4e5c5169808
SHA256109cc7de0cb791e24a71da4e6b0158b3a0a37f2eb90f32d307338d6907746c9f
SHA5128407f05e14ee23a9ea0e09b380742b789d8d58099311158d2dd05923ec1852bfff6b1bc80f14e88936c9216e43de12797f724a972a4bf63e0eaa9f4f89f20311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50453d26e37bfbfabf059e2d8e31757cf
SHA1205cc25db9813af18bc7ca47cddfc11df4f3a969
SHA256d42e600924784c73ec6ac706cee1d734ed99dbe57948bf505bf9c852894daf19
SHA5121d10c9eed95e93e667760ce488ce8483089cde37448585af86f4d9bfd04257ebaffeb77ce788e00e5398d28d25b2bd827daf80341300e3cb046d94fef1a286aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538263df47be4fba2a60a2747b7851154
SHA11065d9210925a3f2c23bfd98542655f6fcc0f776
SHA2561b100e176009924288bb6f1d072a138dccab243ff7fb2a4974656518feeaabbb
SHA5123486bb1a36d86538843e5d223a1cf7b69130d728eb308aa2f883d4e4121928b3020e7f6ab5376c61ce0d284da5f1b350c3996bfcb26d1ee0cda09231f060fa1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ea29de9f07eb09e75063773992c47cd
SHA1420778663b46a45c2f125c30ff3a937f8722dd67
SHA2561658312815cf484cab94f3f18fcea315b7c82b298ca6f10197e5d2dbc2023163
SHA5129d421d4bdf38608c2e078e88bfa455ca736714cfe565979ee55ddfb9c4973f8125e49c412be2eb115b2a1e5257f40bfdfa35e1e7f47d7b8559498303047b20ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fecf18acf27b7ff22957f38495471fb4
SHA176aff8268ed06fe655bada1d5397011cc52252f7
SHA256749c35f4ee83cd2ac2d9d689cc1a72ef9ac3a09df407430318079c92b73c856d
SHA5125689cbb77df34cac66872a8421f978d5c79b1cfa70cb6efb1a941bbbf2adeb3b9cc4ce5e4c15e32589051310af26039174bf087e1478e7fbe79d1269e8a5e91f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a138e4f0d2cded4c43e8fda06e0d9a09
SHA14bbd59a67cf839e8dd20dce856238297c13efb78
SHA256a236cc91be17de3e2b8ba0091f45e3c9029d2a6070f27310642a79a61a57e659
SHA512821d3212f15023249777c90179d099b8d5a6bdb66132540cf16026a99da240d08ae1cdd5c954d37ff8ad08e9ddacd9dd326a6f7c947bb8146d509c3934002b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a60cb996d0e28dea9edf4fd10e40648
SHA10e60a2097a54e9388f7ec227e2f2bdaee3cf366b
SHA2567a715cdfde8d4ba2ef206978edb612bc247ab3fd07228ff433c605957eaafa09
SHA512a3c2ef68e46f2b478755be8fd9886a8f1a0a9ee99274011a7a1a371d0b22e4e94a135ba00c817aaaf95047a3727a2778b4bfebc8c3e5f3c5496f781ed22f1dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5077b62fe430f1254a673f9f2f54f10cc
SHA1df5ac4a0a6ad37ce3d696c23f9ae6fdb5aada6ba
SHA256e8f2ed3691ff5c075904433ffc4e6bc1ce53a57fdfba3b711266bfcc6fa1ec19
SHA512ead90cd227d527008fa85dc6abf145c9054b76a502d63ded3a1a4f031d51ade0b32fed792d7356f361abefce9ce6845d3c4247a8dbb3cd00511bdc898fab5e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6c7ca621439f4d13f52b80417188959
SHA1e6ad83d2e26942e0128a1c8934a8dd713d5e69db
SHA256c12521ac25cc76385746de027a4b6f4c6f0f41145575c8324563e32565acd61b
SHA512b14f478f5f234f7d43c84493395b5866962d813f1ce74d3eb7bc2f3493271c67df5d4e926bf8f86d8b3fae676034ddd6406309bc6f49d934528320fe13ad4df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af91ae1f6648215bcd434661f27c7901
SHA1e636764f411ab6d97efd58df77c54a0c58776804
SHA256dbe386ce5c9c65f3913625aa4acee5b73eafa6a7b84955adda512d7b02ad1e8a
SHA5120591930fcf870375d6b62c58c20a463f85c62d7aeeb23695c5207d60e65c07411800b3532996ae5c7ec917dc9c34c6e4a15d652ee9e4130b4e54a71b84fcdf77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501c368b2f1bea26ea0ec24f92f80a170
SHA1c62404a3be924fc9f1a65ae658de42277f56361c
SHA2560ef2dce15a331c8c25ccdc68fdd4eb2cf7cdff7631575f9b459a90e24e008b01
SHA512dfa1795efef8c78e6a79271ebf9a76e07f88454466333cc138aa72ae06e4b57b4576b0d6254fc12c799bc1554f6b0ff4b61b0769b2392a32e6b505e47f5bd684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5633751d7212b5474a869be459fb58a72
SHA133e4e584ffc5dc193bc562188ac5120fd6485677
SHA2564a6dfc6c0e106f3dd3cee414e16dfd63c13cee2be632f058f9594ef357e1c162
SHA512e26c3e9e136022c56f7b6f74a3b49d59617f683aae60b523188c45bd5270fb554261175a91b034b4448543b18a91477a23fd194b75a999863623e5dffc1bf987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac62e66744cce7bc73792983705a6c03
SHA11b14b8cdb82caf1bfa486dffcf14de1073cb03db
SHA2562506a4209cea61170f8df74458be9670260c0dcb6e08f105a46adbea77b92edb
SHA512b18e8ce39babb1ca917f4cb73986fa4d5a9d8251463f16fd8d4d1166d33f5124862844e9bed36ddfb0ad46cf0a9dd2fd6f06e7062644c5df619cb357a9016987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5763e04395ee6bdfe754caec50f3f9c65
SHA1e6168b9d3bb57e65134c0b35ede2b393a59064d1
SHA2568781d022c730997b7433e8e2ab9da7b4d2641f3c67fbdfa82b2f50e542cff9ec
SHA512ee157da25dfadeec6797e5f717ac8141fd263d59a1f48be32738c3d9b62a766c1cab675ecd8186f16afb5025c375e4c51329a32593cb43d1c6957bc4f6b3c7fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff08fa8662341ae49c8dc7b91c30bc9b
SHA1fc487b4f3748b8d1373690d4d12ffe598f0bff5c
SHA2563c11a4b181940b4d1363db58da7c0bee71f5f9880731369d46014f17b7a0fdd0
SHA5125932b6e8b3876aba18637a9baefdd5fcaad5bba8fb9fcafaa93d86bdcad057268244181d09f74f80081c9cb7f15dc92ed4f8be9fd1d022c7979a4a8f17d6efc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593ff61995aac401335491ca7031f53bb
SHA174e91e111a2316ee1d13304809253f5f5365baeb
SHA2564da7da9d0ebbac40a279475e329601777ec998dc27f9ceb284bc599f9216f7dd
SHA512e48a776465e85d72c26ec485dca90ae5bc89371cec89213e1c141c6994c1c0120c8a7c513f790a0bada79f4f815701fcf11d0a29f8817747fd8bcbe6f0d274a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5503ea7dabe99701ec305407ebd915376
SHA116bfa3293c00adea29da06e17a419a1cc4fa66ce
SHA256b3417800de421d548568b2c73f6f7d7ad5f5980fa7ad267c3e3ce4c1fc6f8286
SHA512b8749b000c4a39dabdaf31a4522fdd7851e02a2453924872187150041b42813c586d587e45dbbdb0deec344992cd74ff5b7b47d8553ff0af8b5fdbd7b8d091be
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b