Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 23:42
Static task
static1
Behavioral task
behavioral1
Sample
d31236d3caa981a4badf8c14f6690e38_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d31236d3caa981a4badf8c14f6690e38_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d31236d3caa981a4badf8c14f6690e38_JaffaCakes118.html
-
Size
231KB
-
MD5
d31236d3caa981a4badf8c14f6690e38
-
SHA1
fb32a29e5f12c771c11000e9e2d7c2c1d0b6d3d0
-
SHA256
44f2b8a966dd478488b91b08d43b30fae38525b619490104606964ffdb44aedd
-
SHA512
8bb568933bfc0187f51fa4a25e428bcb1f20d06c9b2d8845a53c2fd1beb7ff01b4f4aa7f3daf36070c7cb1ac22ca83b4f30dc04dd61d708ddf20c03ca5c4d174
-
SSDEEP
3072:KrIyfkMY+BES09JXAnyrZalI+YuyfkMY+BES09JXAnyrZalI+YQ:KrFsMYod+X3oI+YLsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D077CC11-6D72-11EF-ACDF-5EE01BAFE073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c3fda47f01db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431914403" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000058a37eb6d9b9df07ce1d26dc7ed3fa0e65f80a79dfa61561d9f75137b2378819000000000e800000000200002000000005be216cea0c92739e0b76d388e151dd808fbceffc1d0a02bdb9afb68eeaf58620000000ee5fb6c1ac01b07ad0583bf243b734530556017cf4046a470d4842c7985dbc9940000000109ea9bba688017f770421b48377da1ba3e6cb1c880aaeb9d3f3954c42b93b8341a037ae03cb52d9a210f3932d520414e0f540d277f3a577f814e105b99fc753 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2764 2392 iexplore.exe 30 PID 2392 wrote to memory of 2764 2392 iexplore.exe 30 PID 2392 wrote to memory of 2764 2392 iexplore.exe 30 PID 2392 wrote to memory of 2764 2392 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d31236d3caa981a4badf8c14f6690e38_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53846f2ecb81fef075fdee9699fba6ec8
SHA1088c1e4aa6055de414c638efdb916d1a22f5cf92
SHA256e26b56abb8d332e2fb106303d9b73237998d98af695ae050fdd3375cda672da0
SHA5126b64e0b2bf97c60997f57f123c9d56cd596ce53f031778c452bf5b89ead553380a5772b9d26093e09cc4f1584f2fbe03df876a23332b8aedff7c5d1832bed107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555c88fc17c75eb075dc458acd177419c
SHA19059c85808bdc956e8f0b7ac74bff49247d6377c
SHA2569eb4df4f69075d1de1919b1507caf0dbb473329caf0098167511d71b78a1c22b
SHA51201381d80961223887cd707678aabbf4cef33bedac072753a4d5272e3d4da12efe6f57c437d914d3b1b4dd290e58142db2d62a68f6854db34c37e75013d928633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bb6b6060b80d354612009a01e882955
SHA10dec4a19b8f91e7e4288a1f8f1ddf4ef32e1ef7f
SHA2565029fa13eb88f0b202df388cced28817e6084f10bf0888e804d9974a41ea3771
SHA512c2851af97742438b6b36bc2908cce2a8f989a59c42e0e10747b53fbcb5f3dd1b6135724002940e0e3298733f334f639089dd9a50fa9d254088da902ab93892a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c6491b4b965fd622c92bfc5b18c0ad
SHA10024edb92b903c4c6cf9ebef1976ac46f7c8324c
SHA2565df629c80f7a3b450000c137428507784a091128600fe85afb400d451d2a0373
SHA5121dcba26b956ed00ab1eb50a23514fa79da31dd4698486a2051142f848c10be32240ae9d11dc8f5989229899a0252985d0205861d2bceb530ca40aaeea32bb191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2c294579f56cf3e69ea57d640717eb7
SHA185432e4dae450bd030353d2aa44c53ac89807134
SHA25645cb45f9abef966d9c7611a6441ac01629fddd65867b9f1d775a7f67427dda5a
SHA512922eed37f801af64770080a00bd9fd610bf671686dfa564a3e47d31a15a110d8cd11bf5ae714f8a24983208f63d33e26dc194b56f38d4dd88a0317565cbdd991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d9ccac7ed728054f40f88cd1c9bb3be
SHA11f1783bc9c8165560ef65d70423dc191d209738c
SHA25625d362d7fb7c05d6c9c4fc5b9c962b60243aed2f2d4b3c49c661c89a16f90f9a
SHA512ce04c35241db219b923c78ac44b6a9a7691b97b3c3b7b4208488e68c5e05beed50dcca29defe60f5a4b9f332a1c30af66ee0bf94d30f19469afa0fe8437ea6d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ec399e3294f17970306c5b65f90fce
SHA15e98505a00d1a323476e6a5412c8ed65faafc268
SHA2562d4f78752a936e84a0bbefb4d9969751dfc99f63f5668d182a57339d6932a039
SHA512228f2802bc00a3f1a196cb13fed55340e9322323f3c9b8a21c6c2af66a44ba080d60f3d0c6a44d192e95f6dd67da6eb59c6b6d015d9e02f0187756c04e26a1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5250015dadb54c0c51316aeb085421d5d
SHA1963c6a5409edbf70c8ec2363c66f40cef2564910
SHA256f70d4854d2fa6307087eefc5967459f6c80e5604e0b6eb5a8cb7b09fdbf0b2f8
SHA5121fdfc86dda0877b3c699e499915173070b35e3ebff6124663b2f5558962a927a25cc75b05bb55047c370f42534535c8dcd0200f952ca7c8ff4b53cdce1c5afcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aed319e94bd1d342abfc3d01acfd17c6
SHA134a726875c19dc2e1d1c3128852aa462b1dff6f2
SHA25629eed0ba62a6b3f0e93dbd80b303b3fceb5e5f10c928473b43bcbf98f7161d7e
SHA512874072aac662c9105f75381495817a9468f6b229972faeed292331ed91adaaff3020d56538b41c5943e31cdc886aa2231d573ac5a2889a99f8b008c3e0395e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e6f968649b7c101e946485507fbabaf
SHA14b3e89c244df213f3ad45d549367f3457b43dfc7
SHA256843b8c92d2b9f2649996f573e244b32f0ba4aed1d540fad8ae5ac337b0ca4633
SHA51253e45cc524246562607e7c87e4a17c15439d2cf15287f6fbc3f8e2d29ec48897199968ce9d39df30c2daa5b2056f673ac6980f6d09e9af4191e8ee3b0b46d003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d795baf8d627b67e4cebd94b7a2fdb
SHA1208a91107c84e4a2570661a8632ed98e4e5d7223
SHA256fb95991c64c99ca04fd2e7f830e0ac3f6ebdc4fdb052f7e935366f94eadc5401
SHA512a16d9721f32999955eebf6375a3d21eb77127e27b02fdfb525c23ae5ba51e70cb4457b54b0eac37c784d8c17fbd15453727af61a5190aa4b2634513a15c2f550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dcefd4224d58583be9bbe59e34a607b
SHA14d7f5e001b161cd5283b428bb7d89af0052bb9c6
SHA256f886f07840a6973e3f1fcf61ba1da207c8f1ca6da72a055adc056a6bf601c4b8
SHA512d9f7a6a2922cfa094e49e17709a9aa78c925842998aaf5727e09229e26492a97e66a5f15c4af747686fbe44721f6ddda0b7036b273d039baa77223b1a982b565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503ad405107907bf68746d2d0afa9a72f
SHA1e1f56ddc96b57d203020fe46e7acd70e6c10cacc
SHA25638515042771aeb5da2127caf1087d43c9af17fa146ca08948a9a85d3a7686a0c
SHA512dfa7a5e1d9c6f709795bc85753fabe8ce90555eb8cbb9583fea9e378e9a0fc49726c0353ee4db0ea0c2ed6896098df1a850dc3c8ed3608ddf4c77a1881c65a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5319d0033590d5bb01c0497fef8cae030
SHA11a15b7c6dacf0ef4a38fdd041eddcc784c7b095f
SHA25699fc76bd04a957dcf587c96ce018b8b2519e14930fff6ac20cecb84f0482ffe6
SHA512a34f50834c766860d67362da4c3a4922e0f865e8910c576b4ded76fe55e906b2d6ce7af40e573ad805915f7a6dc4d0f704b3d64c4814269b0d66602438f4c55c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570123d61cfacb2dcaae865f53b653a62
SHA18a020ef71972b5e56617afa63b28b454b49a2a8a
SHA2568f403dd668b857d09b49d150d1f08696e138e4ab4838cf215a8774196c93463c
SHA512f8f6a40a60f44bed1bc900066c3aa6e82e977e5e2d3b70b6d41916fabc772a68f83ceccca4532424c736d17f13e4be95603cdab1126892411522fca63bbd5ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ee999d235e334f8851e5030727431df
SHA10562ceddf628e603391e5bf391fdd5ddf70f253f
SHA2560e0f9afda538cea00fda62111ae14d50e193070d115e502f83e864998f4a1add
SHA512e8857a6077596d13fc170d97b3347c0abe79891749468911290f2d91ef81b620f17f81cfa7f69865eb42da3397a3185e6a1bf4f1d6f812f6c035a1bffc515c29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549d691e01df9d272f050033c91ced705
SHA135d82bd5cc8e78ae81af847bfd8053dc917148e7
SHA25691c8cbac5bee17174895f42cd874229787a6896188ede1df48013e00459c46b2
SHA51223f1450a288a24368828e05f0d5f8169e4c6b19c76a172141f254f44b8ab26257cd34e165141b5a118bdd205f05dbeeb0c7c839667bce6a0d49e7e60cbd9bcc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0430cd0c6f5fdae046a8eb84c00df77
SHA1082c2be338402ff9d1fbb8bb445499e9b904e30a
SHA256b99e7bfcf569afdceec0de59028805f420757f3f132a5de53fbece7de9830f6a
SHA512c92bfe4c4b8b9d31c19f8114978044efae7911528b9464834b7e6d93e9a3635159a98c24d16d5c7466b93cd5526a3cccc797d26fdebf1b0c4a9238d8c428ffe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd261c16f93f5a8b2a94e8392f89b16d
SHA1605e60a2b6f8f4a9ed7a6814bb01a81671c66be3
SHA2565b663c0174ca76b4e007ad37119b2b7cba5c4eb6de96cd0ddb5e263868ec2877
SHA512d9de29ac71982e0b2295da3c76d448f47790876f2f4f4fccba208344ee7a1cee0f3d1c84035cb6b4210d6f4f41c7db3e07687560507c6189b9c709464850babf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b