Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 01:06
Static task
static1
Behavioral task
behavioral1
Sample
df37f23e52a78ea88f08839a82543f4e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df37f23e52a78ea88f08839a82543f4e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df37f23e52a78ea88f08839a82543f4e_JaffaCakes118.html
-
Size
139KB
-
MD5
df37f23e52a78ea88f08839a82543f4e
-
SHA1
04293469edf91cdb54b6768e85c3dd1dd264ef36
-
SHA256
a7b08b09f00ad2a0a82bcf8821f5c3fdc159e5d91f3a865e58e16b2772b0a8a0
-
SHA512
ed0c8f425559db9f157a1f195c80f0f28d3ed0d1e10ed1918534e68ff3f7d0149ff3c00c041a65ded19011b76045c3cd3331d785a561ad7621e7fc084d8f9d44
-
SSDEEP
1536:S3NqK7l3bHyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:S3vFbHyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C0EBD01-7235-11EF-9E99-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000006a563526aa7e7e3fb7c36c6d164d6888c00f321f72e44e4fa68a1620141468cc000000000e8000000002000020000000fe8b5b6edaeaade4d660c28e735fdc558646f897e49c913803d68232a6ae78f020000000584ed4b2c39815d154ea56c27529454442ad2d6b42822508c864821b2bb03168400000007727e2a5a92b6b3bd7c6b2af19cecfbfc6801965d3c81b018c79f816b6a73b2b0455a4a0d0d94d58bca7896c59be9fc15edb862d49d988a6fd805db5054ca7b1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432437846" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10c70fa34206db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2116 2000 iexplore.exe 29 PID 2000 wrote to memory of 2116 2000 iexplore.exe 29 PID 2000 wrote to memory of 2116 2000 iexplore.exe 29 PID 2000 wrote to memory of 2116 2000 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df37f23e52a78ea88f08839a82543f4e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e345ec7bc28bd5eb036f0c07ee1e0cf
SHA122d18f6e87322da148c5cf935674371d795e3556
SHA256b264b12794ae6d6b1b6d693760a2c9bc069a1dff398e5f71d50875daabcf452c
SHA512903c71d428dc5c7f9c72677e645c1683d099d111e9220d22ec91cc156eee990fd383696ecf8aeaf3443dd94507121f749c4dd3e01a71a45ff353b47a545d6b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534d28de970d24364927fe4c16e25c2d3
SHA1c192216da280ea057cf35763e2c13f614257c0ae
SHA256ec62da7728d3ad074461e645301a56e8f28f4286a7a65450e79d761c0e337a9d
SHA512ab14bceaf24e6382eed68400ba53ff1d70e4c96fda538260083b968d18cd169b5f7b95fe422173efc9df9e06e250d010bf30dc12d0dd7b74c8da59f8770433ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540ce5ec9bc29e486493cd930d1a94232
SHA13257b67c05c5b50c5102d65858acc1c14b30eb14
SHA25606cddbd764e797aa5101c710baf522d6ba3648a0e031deb7ca598fc3e4a29df2
SHA512d916635cb971edcfaa8cf14729aa2e0588f511d950c728172bc2696c4ac55c73f95209391150f813f1fcfc96a4a12905c33f4215a11c8fd83557ea4c3ff60caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5e701032592d2ae722451e9fb0acc11
SHA173c8bc94a61d310a78d05aba472b5f8b2b66e83a
SHA2569ee364b351ba0be56e7ba8027923ed55b576e07c8e11fa725bd9940e0acf38de
SHA512128673eb80d4870977394884781a72c745664e139c942c05fa5f89d5a8a2029c9dca86a1691b19efea93dd25cf715b5f9382f3747ae10a4fae61b9a3bb07e498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e567ed0ac2aa153d1e13a2ac6d724f43
SHA1be598fba19d3865a1b769134892d6b1a5cbda2b9
SHA256dbbbf0ffeada4f81c766bf45fe16ed0e6618ae30a465237c2e9905fb74658510
SHA5121d7f7cde9e33257f557ff83e08850b5468120d0c4c78b716defd200af2af37ca0a7472f316d199464260e9b03a3f2d9da1fd632f92ba4a89ff5c09f8bce2b7b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50418d6ed3d0ceb5f82a3db66197a2436
SHA16143b085c544202a58916cde78a2a50046acb75a
SHA256c68e6dd714e4840084ce1957aa56690804baf5aabcc0eb0fcba0007aa1380869
SHA512115e70330e30de9ee0cd83ccdff7d1d99ec4250a22758ef98df4e7e8add0db74796613c86be72976984910489413f5c932c3fb107e22bcad7dabc923ff6ca00c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5608999bcc5e625ab911a01732f7e71a1
SHA1570dac38e08583b69e3f7fcec6a2d80d0eefd368
SHA256582cc9165eafadc609a9833020459d8a113109bfed46e285b72860d1dd9db81f
SHA5122da2d90ddab38a5ed4fa45c65e33e9a6481eb4c64350ee0568d39a5e72a5f2bd6632d9f36c1e7e24127bed0761eec848015e717e2d84ad108b8e194d3f52695f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2e385e8e45f41e7bc7a9e9f35d0b9d3
SHA181bb7c8abdee796e8e18c5c928754201d27c6c33
SHA256baf4ec2e3a7748974557b75011195791fa0dcad38ec96e4f5f9be0da3d8b6485
SHA512bd22a5cd48a47d5ec5014fa10faa4196ddcbb93a698958890d15e0787a27114c10c44686494192c2fc1bbdde1715cfcf849b21783c0b16f7fba8e1873e9c1994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542a034c939e97fddd8497c7db14930a4
SHA111b80ea49b1ea4f1da870c382787b0fb08bfecfb
SHA2566b6aa15551d074af93cf4bd8206508e25fffa4ecd49df80a95def1441bd7c613
SHA512430a99a2f4b5c552de544b188c525149c1793f85ad4da67a74a5250630b675ea927c0f1d521a1d10a6fb41a700156ad263c1e7108d0d441f0917fc210c4e612f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594cafa20b074fd8b21d5048531f1256d
SHA19fcb056ad2f6f572a55688df99be7684fabc6a84
SHA256431814226ffa46c50b61fb4fae93c4bcee1ef4c019ae222b0e05bf2f9ef2492d
SHA51248e3f4ef796ca1e230e4f12c2a8e4cf58af38e59ea1b9f7cf0b8b5f9b1383e23ece97d2aeb6577cfe9f5c617243ec928d047aa3e509f2b0f4e381495e4957076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515080d889e514f64306a220d12e1bfb4
SHA1823fbca959282d8072e814cf7d13050d50883c1c
SHA256ef97e5a98216ce4e93c33a2eb779a64be3254cd02695741b2d39d8ba6656f3d6
SHA51208cb1926986bfb3d8694cea6c5a77027d703e25edfbb65eb6f6a47c1464627935fe9a1aa45f32240a68181c2670519faa6f4fe75300902bca0afc23d8597abb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efc4dd77d27e61df8946d898fcf93fd0
SHA1a741ed85b0216b4180a8c473889deae303c66031
SHA256d6cd1a2fa78a6d60a5b85e82c64610c129b88aeed1f964a99a2a9ec52d58be9d
SHA51289d1624026ed94c7cb878026ae56e23604c47d7fd5f75f188ef00e3ef738a5e8620c2ae6c1eee7c0e60c15c7e99aa524509af0a8442f3aa704de1b92b18b5d46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5f7f3d4572faa5e33c666a0048fde31
SHA101b718b672db5dbbf1b2b54f4faf6d21f8448304
SHA256906e440f659e1fc8f9b661b02763b5b15e11a312f3d5a6a6f60bd8cc1e95411b
SHA512f1786b3593bb6648b8f3df6c8dea037b65d7640b12f899131f36b53d5593a3eb078839f5d9c453524f9a2d44076e7c8ad368387bbc179600e82f3fa449edaa2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ec5498682b9c8841033d338ef9cdaf4
SHA13c91a6c179c70b80a0d6bfbb79f25312de8d7ddc
SHA2566f42e031069ab97d86d2eaea07c9296c8accfda909d3a130f66e6c63a5c41863
SHA5124f3a9f1c785a66c6007cfbdd49711bb1d5c3bb5c334d6ed4548768d57016f0bd7e05ec6c7175a460fb81cbfaf34508a5520cf33e55f95a06d5229d5efa44af16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9efb9013ad8de588ac4c61028646415
SHA12120aa5c76891eb020208f0a24a4df8942960e2b
SHA256c206ec276194378e5630077eec4ab25938612f17ec79237ba9cb0c4f71588036
SHA512e280f47b17b55b0f17747d7a64235ce5950fcc732988e55f93bc62b96e9c913433e79549fa4f9b10227d45e80bc4436458f2dc1ea7cbc243d020ffa0d37aab50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eeb5197ffe41ad894ec8ebed05258bf
SHA1f22bb458a5bdfc0b67da64f5b3c3d9e50b20031e
SHA2560adbc079dae102d5f119a0c4597513322f428a902c2d11625823242b113a592f
SHA512ad1cc47db6fdbb0f51a14ce5cb2c245d43a93d01508a076f2b561a3ed1859dbf50f2f403d01b47f0b0939154a717757672dcc5315e170e9b31112a07a9240528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebd809472f3d220e6181b5f5ab16c6b5
SHA1c2c4a2f815a835b8743d7bd522641de0d6904d7c
SHA25612e4e1e3bc5254b10f4957cdfe92b995b4b358fc49640afb1e874c707dd902a5
SHA512d3299ca5d6b866ddbc2072620c480989d70b6ada182c0dd73256d8a35c842393ef95b5c65813728c2dba9e485168eb06b50fd65a0ec2359ec1a77d59b33ea0b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f678d8b753d7c2bb1979625bcdb72f31
SHA1fdbe6d1703d82432af1e7a283d81d75f8da8e09f
SHA2564c4f0c3a566635024e866f644b281160bc93106da7a473516eeae1e3635b0f11
SHA512b03e61ced0b97fc0bac291369d2b771ee954280de32291b9c847d8da588c63ef2e9f688900144952f56753217fad7991a28d39499b6415f6ea6726cfbb52a946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6e920ddb9b01321d18be37d4e8b27d4
SHA1c1fc30bec6852138638cb9cbfdbdabc31e89d44f
SHA2563984623d313e798bea48cafabf3f4c795c4dbe52f82bba7f3949dccdd14442d1
SHA51264e788ff478aa118c14ed85744b37af014e36577be12e97da32d2b186dfebd83985638ce857916117e83e79d218fa3930110077c730448fee630146cd9348214
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b