Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 15:00
Static task
static1
Behavioral task
behavioral1
Sample
cfcebc0096e9e2da866f3cbb25af764e_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cfcebc0096e9e2da866f3cbb25af764e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfcebc0096e9e2da866f3cbb25af764e_JaffaCakes118.html
-
Size
34KB
-
MD5
cfcebc0096e9e2da866f3cbb25af764e
-
SHA1
e8888ae9a56bdeac41a5d7e3dfcc9ec74ccacae8
-
SHA256
acdf54a9a19eca68de4a5af4c385067468fb4a68fa33fb6ffc545d22f6331c90
-
SHA512
778ae261cd42a4a42d1f6db00d7de8887a20fb77349f9c9ddda2d2164b0a0cec0da1efb22e7e118babde5e5d870e719958cc78f5ac1d9d9b02e1c12cb4184679
-
SSDEEP
192:uwrt1im1jhOKKb5nGGNRpF6vbG4VWaOnQjxn5Q/ZienQiewBNnSTcnQOkEntnios:FQ/ilEO5ywg1a+/z9zajP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8C86821-6C60-11EF-AB1A-5A9C960EEF88} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431796708" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000000300a2151fbffdf1aa701826e2c3a840ef6ec41454b1a308e8747c212b66a82f000000000e80000000020000200000009fb7d1ca683777fef49c095b1f8e5b972f46e8085f81baa76b49568915f3955220000000b84843b76cf4079549462892eec3dd7bc3bb77868bca8ca4d17d3a7f460adde540000000cb971d09e47f779ef5a3732a4b187bc420913e8536cd0dc9f509058118e0896273e6d7ae2c55c90a8e79d5a47ec90082f1ae59c5d8b943eaa5f3da5e206eafd1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40576c9d6d00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2732 iexplore.exe 2732 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2696 2732 iexplore.exe 31 PID 2732 wrote to memory of 2696 2732 iexplore.exe 31 PID 2732 wrote to memory of 2696 2732 iexplore.exe 31 PID 2732 wrote to memory of 2696 2732 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cfcebc0096e9e2da866f3cbb25af764e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c41e1b9367d072113181325cc7f15e1c
SHA1bacab489c21aa50dbfc58a61671c7d2ad02a0870
SHA256cb825cc6ad385a6fcfc0feeb7f283c0dd934c0702ebb5ffb2ffd2f7728322cfa
SHA512269ec19d4761e39e3db871c92223f7d0424504cb1ba9711dadcbbb9cf3db2aa5c0970e5b14517be459cfe2b93578a0c6f13639fbce0967ba546a4e6b47fb95f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546390020c179ffac2bf849d2129426d6
SHA193aee4fe9c975ad67c7d8c06c8fe4aa5f6cb4f8e
SHA2560db18d3c3427fc7dd728e0f32202a8a8e362288fdba2f38f8fdb174a73a4cd2d
SHA512be6ed4bd312339aea582cbb226a695f5fdcaffac8d08d3f1e7690013c3797aa731924a54891235faf4414f4828a6ba9cebbf4e4a2676404315869340ff76e349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ad63ac69bd52ce3a2fd20e8509fbaab
SHA1412e55cd258a67225ded0200e9e0b405f51ef8fd
SHA256e6b8d77da204210132738043427ece3dda6e2aa7d8c6f08b68b8f1757743c0ab
SHA512e9e1a8ac59238feb2bc0f485fbbbe815fcd40a25deb21603c9b587c37af4434833a3888a2d63f7277c1bb6423f001fa679a24af28ed435fcc9a850239bce9336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5676a94b170d0c494c4e1a453be840be7
SHA129d4f338141e2b797b070312e603f06bd3b7ca89
SHA25689469a5b4e5f3cd90e9dc01b8e56fa9f2c19449fba97eddd82c21d0219710778
SHA512771b0a4a13e1cc0adf534a6fe34f25b63887ee06b1e69633bf086180645a25a3645e67f90f85b041623afebaa56176f69e81b95c41bab5b8fd299a75382fb76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d446a0bb46d19e8c51c966133f053d67
SHA1029f647d3b779a213888ba2c95f017b61e9144c0
SHA25632ec5e5ca0424fd4dc01731f94db54133286656859a711cc4bbe3100ee769cab
SHA5125fe71ebbe3aecbcdb15c97d35d6e8e5a211406571db5356cae41030aa52be390c793ccdf9741bac98b104380892b5343d9c72eb08049523d24250c2b1e384afd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f4ea89a83f92e1a7d28f7a99fb18c8a
SHA1e7d52396f197b045b6fcd50623f5bbc7ab543236
SHA2563d7611eddc7f65fb4e6fcaba710529f4467f6243659ba07af5b5e01766b2d489
SHA5126eb1b1c396766bd95bfe4ca80f31ec4de9b92e6bdf74fa591d372c8fcefa59f68fbfcaa6a6d81856e8fca9566e62753953968e196be4f13aad0d7b4775fa79eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590b56aea8e4fab9e5e3e49a30868b793
SHA14e6ff50599e14ee522feba1e43ebd876440018d9
SHA256b5f39492a14f31a45dba1967c46e2e8d48f66d72a019be19bfdd8df6946efc7c
SHA5126bacffc72004f75580f6bdd023ea0502ce9f49eae6ac97f48b0a4c26b0ba3ab66d8417a1fd9ce19dd0b6a0637c18672e8552e16b8f6c7982ccb031ebe98f2b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de5883ae91f96eb03181db6dd7f0e138
SHA1d4a56cff75a46763da450256d0276ba64e93099b
SHA25604ed61a645f8167c8c43b8d8ad847cf3f44193c3def7f13c75797a05971a5dba
SHA5121bfb8b9b7623100b0e55960da301f4025068416064b1ef10458fcf82bbe53fe22dbbaf900eaa5d07e631f40736bb5cc70b030cc4a5941b376a71db50596eef0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ef276de34e5715a0efc841476fccce
SHA1d903c397c6381a651508082c9dbc56bdc16cdcfa
SHA25693d45885077af787398673c93dce880cf788b47b6295d526b574f77fc0870906
SHA512c24f7aa572dbb9071e145f6dd81e0a4376a10ee6ec15cdd897e65b230eac4783a9b865e6930d3dc06f3b31f52517b2211f6c13ddb3e67afa55b60f1b2ff5da1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edb24f8c6b4e7b295953dcfccf1e04c1
SHA121d59a2c688e682cbe8368c630b6a98668aff654
SHA25636e66761a84d13588feba264afca2c3f3570a38d79f33b41dafe6bafc9569bb3
SHA51250cc6bfafa6836ff0b8f7d379286f922676523d7a4c93ee93adc2cde8e4cee3d75b5ad7a1ad0d27b13d3ff08bfb26743a5003e9b55568e38ca96441f95250ad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75af230cb5bba440ce2bcc1313bc559
SHA14fe2f863b21db12cb1d83ca8a8a2b2d00bb56929
SHA2567b7a7334a7426fcad5f5c02821d0c83059a78de83626ddb1a318929b4c4a050a
SHA512f5e034bf14f186450ffa79182e7999cd8547af89ca9bf7d5891ff1706c53b77f0fd485506790e6055916de67fc0becbdbd80285c562151420a7aee95b2f75737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542e2475560f18f39c1fa80712b21ca53
SHA17e1a5b3a5171511e7b3cdb92bcfba9b79cb1ec7d
SHA256ac769f071bb36808b56968948a9650b3dc83cd3848255398014782816fc0a909
SHA512f1a8143630335282c8a27a9b91b756a6a251506202b2cadd6f0ec0bb745de6205c49d528a203d8504b65ad51dadc95fde8aed657faa846b0873deebe8bd36415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c270dca4e8557bf680e710214583585
SHA1fe550be01910a109dd006250bcbcd91f5aa87b5c
SHA256680a1de3b0b168a58e7eb7e144195136eaf8dae6d1266b57ceaf2c7b355acb89
SHA512e8bb1d0200fa598b036f302e066206a8af95e2df449c6760e01459ce94002fdcc8c89114f497ca0d5ae64613bbf34a83079885a5c213e9c8ecb879c858762b2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569198e4ab0e8db2d25f9547652cb24f0
SHA1066b67e4262534410e0ab7f28f224e17dcda8015
SHA256a2ac1116a5295e9741397aad530494787b4baca30c6c747f356c1a1a2989d2a2
SHA5126bd70af990f41981d8265f99ba1efcd4f501ca97fd3783db78333067dbeb7f925865f73f17148624329af621a87353e2e8146da09dc99181997a56052b77522a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4838208e0674742de7dae97da8fec31
SHA11bdf0fb151559d9cff92b50e180252153386d276
SHA2563c3f5a21afaeca513c43b88932519e0ee3fb1dc0d898dc957d1a31b2edfac3c7
SHA51276da15ebad59790bf87d6e8ffc3ad78776fa24eb55ba38d2d68a467d1557e43d6db9cf4249ebdef4b260feb35ee356bc8eb829ba8c502cbf9f5028100a0a9f2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572cb2098a6c30f05c9452d1f0801decb
SHA1dffdaf008208c8d346c89cc2c5b452edcda268c0
SHA25612722a81507673f4ba3a40b59b81e155b4b40ade71436951ad0b3853adc020a8
SHA512f9825407ece9e97c741f560a817231453e37d0afe99a671e2f1f74718a4292ce998b68482d88ed84bd5073e6131d16abf68f5ff0bd4e868f431a4f9b7ca39283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c027ed530b0d1657a09e502e75c50a2
SHA1d72701c72b6ffb0f6dd8e4867dce0f56c22f3f86
SHA256d7218a9e721db817c195ad2355917e82f533b2b1064f3aa8c402cf3d801791da
SHA512a45f084d7396d65dbf776b11362036ffd29193f5c358377c309bd50c88411586db518fb188c5eeb937b93201f521f5e2dc383638372e608ff9bb0b8ab1276e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59900c12bfdacb33193c2fecc242ce8b3
SHA1838e7bc9b03c2f04f4df8c69b44613b08192955c
SHA2569553835a8a883bab24ed348898ac1e192ce6d15e8d5895ccc6b7ec380f66750c
SHA5129fcc8bf8134d7244c5b18edb46716d7038e8a4ffa76f657b0bee15c7c97a39839e1075b042e3a66508fceaa36db105db726e8e46aee62a9fcffe867bbba20388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a90fceab2285c7d469be788d978fc45
SHA1ed587f3799d8c7503d6f1834af7d31664923ecbd
SHA256710503f58f3765473e809cc89718dc541ca12a34064bad2c8a746881ec732201
SHA512feb3a810c05f7f92329b8f04d5eb6e29464e1b776c75daea559bd67fa7931dff6a37b7a6663a633543aaf471a40851dac4575d5d8d9d95db71cc5e842850d48a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b