Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 00:05
Static task
static1
Behavioral task
behavioral1
Sample
e3a2512f819f37dcad5b10fe43429450_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e3a2512f819f37dcad5b10fe43429450_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e3a2512f819f37dcad5b10fe43429450_JaffaCakes118.exe
-
Size
265KB
-
MD5
e3a2512f819f37dcad5b10fe43429450
-
SHA1
93fb5debb25d0b75e4152380430bdcc0747b2474
-
SHA256
75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3c
-
SHA512
0c80b7249568297b552acc5b7eefe3adc904497dd066ee4ac01632e0ccd3d5ff9115a27a12439022d9dd8b2d94a25ef6e5f0f3f2e7b4c560a5180963f20cef73
-
SSDEEP
6144:YyB01uCflxSB8Fvhqao9PpJwfk2sNI/YSzq3zM88s73m:S1JfFMjJazi3z12
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/1032-5-0x0000000000400000-0x0000000000504000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1032 set thread context of 1500 1032 e3a2512f819f37dcad5b10fe43429450_JaffaCakes118.exe 28 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\paramstr.txt e3a2512f819f37dcad5b10fe43429450_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3a2512f819f37dcad5b10fe43429450_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432607014" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6CDEEF01-73BF-11EF-9F10-C28ADB222BBA} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1500 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1500 IEXPLORE.EXE 1500 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1500 1032 e3a2512f819f37dcad5b10fe43429450_JaffaCakes118.exe 28 PID 1032 wrote to memory of 1500 1032 e3a2512f819f37dcad5b10fe43429450_JaffaCakes118.exe 28 PID 1032 wrote to memory of 1500 1032 e3a2512f819f37dcad5b10fe43429450_JaffaCakes118.exe 28 PID 1032 wrote to memory of 1500 1032 e3a2512f819f37dcad5b10fe43429450_JaffaCakes118.exe 28 PID 1032 wrote to memory of 1500 1032 e3a2512f819f37dcad5b10fe43429450_JaffaCakes118.exe 28 PID 1500 wrote to memory of 2576 1500 IEXPLORE.EXE 29 PID 1500 wrote to memory of 2576 1500 IEXPLORE.EXE 29 PID 1500 wrote to memory of 2576 1500 IEXPLORE.EXE 29 PID 1500 wrote to memory of 2576 1500 IEXPLORE.EXE 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3a2512f819f37dcad5b10fe43429450_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e3a2512f819f37dcad5b10fe43429450_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1500 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c94c6abc7ca07f9db1e016c8488e930
SHA158606253b3bb5cb8713921b97672eb3b34f06241
SHA2565692ee16cafdce6146471928eb7ff07e79a418139a6c5a5781fc50c5728b7a25
SHA512a40a50c3b864e9a3ada04e850e5862c1c1e2f96df67f70d751589bba4e8c9a786d49c2f397f8bd120faa9cf99347940f5f1f64fd74aa89958e0a490dcd442fbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c09d8ef7180989cb311bc9bdcf23823b
SHA1b67b5e91b7f8e96a4faf8fb30fe0ef7904012afc
SHA256487cf15055c79b0223024a5c29ec71a8d818727f38fc6a261aea26e9fad143d2
SHA51293d3b6644b3b34e8e5552225fcc16fc8e29285665f661b3d0c4294ec94a8845b6ca00cc143a4f4e7d3c33d1327c515aad7c324011c754a5705104f60d48f45c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f17b5d2bdedf35f3beca74d49648a95f
SHA19fd778b15d47ff82c069ba92ff21c831b7b86e5c
SHA256884f8eb68e477f7b2be5c3c5d3822668736af24b38ec234416c786cb8298aac7
SHA51287a8726bac163f3b1a76b355e9c6687431ffdf4e939e236c46c07029c5b5de105221a299b2b33d9825369ee9d8b4e3b27e7cd20735fec4b36b44da2d3111abd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57125a456a2c985acd42e0e9af11f141f
SHA1772faf3d2c2b127c14e7b1ecc8d82f5596c8a7b6
SHA25663b47ad72e24062b289621b55c5bfbcc99689bd2b5161f988af8801b111b3d6c
SHA512255607f3503e4bfac2a39dcca24ecaeb6c806e466f802c8466f337aa65d5ea9e18e9ba125b45d566c0b3ff8171d7c3680b7d75bb777a5cc5869700bb03fabf59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a58a2e187ab76f021396312728539d45
SHA1a90ee8048804c5d7f0f6ef55b5a94378331f40e3
SHA256d6cb717e152c7aee30b3225bea97ea4b830b00c25ebdb215a4a2187518f94361
SHA51244cd1b7a360e79eef6d06550a32ede8f8b01f61219eb45bfe9de014a1242999bccb9f5ed1f034defbe2e5d356aa1ad709f9baadfd103cda0452e58c360b999ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4c2f6005b661b09eddbcb51b4164f1d
SHA188bb537cc9f77bf44d18f90deb3a2566a8258469
SHA256396670b325fe57710d1c14d39f49f0619392bf55a60c43b405265b93ea9483b7
SHA512395df8fb66b71f5bdbe535cd154987d4c4b397bd583d98a4c49c018658c6f1082166248878de5b0948e3adb5c11fde3a6c1b4b55651d7aab834bb5016925e000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1393391a831f0b2d89943a5414777f7
SHA17750716bcd7a5b4d09d7c06deee879773ee90f80
SHA2565177641457f48c713380358832809665f3905ebe0f592c2d658413db09addfce
SHA5121a4f63a337525db8168bf7f85406722bc87b8bfa44999d2fb41f7a25f5cd5bb0b317b79225091a4d0f4bbbc39722f16a031c80bd89ac35b4c1a01706d7ed176a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5184d7c25e56f319fcc9e8507e30a6d01
SHA17195b67bed4e25f5d1652a353da31a02fc334445
SHA256e0a6eb94a657c03ca60b6dcc5a58876d1628081a293bd498bc2488dc92b5de81
SHA512c78e1c8f2be9cb5b4cf111902d1e4801999b0e8788c344f183ac419396fe969c24dd826ddb808000dd7bb2c8a98b09a85b812f13b2dbb2a68abcff9a45441ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eef2c3007e1f6bc50ebaf2c9eae4704
SHA178ea8a5f4aa247063e0b6bf37bd6e8293bca1b68
SHA256751184884fb241638476bb5f373997f1278aef4ed1b967e29669cfc1f224d183
SHA512672e154cc1474853d588ece2b0ab3f99482108f7673a2e28973f95c6fc1c7ca1c8ae7c8673b78a021ea2dcb80a30e515b75a8799a833cb8b829cc1dac63b2a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b11cf74cba8c25f4e21c31966842b8
SHA12bd83dd065e460ff17d007b675ee4666c1e8179b
SHA256ab2cf2fdc617f213e7294f2ea0b008ca804450f8df20a47cfcfa9fabffca9697
SHA51232f419d190a66e73cfd682b5d67dd29a8a4c73c2a262e6668288ce1c917bf0c4d82090adb751dc837bab29c7104a3ccc6b7e508685523716d6f7ff0071551326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d07caaa06a33a67f56fe7f2f34e35d8
SHA1a78980bcd7cb7e460ee1a2ccb0f7817f47dc0015
SHA256b9ba29f37fe6ecaa2ce1e9605715c9617b250c5210331e0f0c095ce533cab831
SHA5124179a5af5223ea2808602e08cb5cb7e48179a19af64b95d04ffab2e9b0933385905fd97c333400f3f6f0a4eb5cb08410424956384760f6ed4d6aeff83240e5b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b93504bf59a3b6edf35010a97de29c8
SHA158336e2f51b46b238a1023ca3f040bf4b7d5cd11
SHA256dc8c69b60c1af74acab143b3c28a6f277aebc1bb3a91b20077116fed3b78f367
SHA5121ed0d880868d6675b23bfaa45502aa4133f68e1b263320f2f3f553922bbdeeed41e1cc15f66f42ff617a9a7fcbe70f13897f32c5ca38c49f2789567ec11ac132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589d1303f1ee9fe8ceb586cd34d6db5fb
SHA1eb9fae9943a84a48dcdda1b7f2d9b264aa069e81
SHA256d2b7c0fcecb23f3a432dfb5105bedd37256c3f2987f5d973301155d834c23f3a
SHA5126a5e6037117dc66397218e52417ebf39619014a665511b1b5d488b16ae58c7fe26ca5deacf1f8200334a629cc472babb93add070bb18f442cae109f97e017921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e091691ea33bda8b1f5652826bd233aa
SHA106301b30e9d890c4c3fe534ba65363e66d87fd6b
SHA256c0f3f2dee9fdd951bb3893b93e07b8de5a0f80f89ba5dabd6902a0249ba6ca3b
SHA512cf3d26e170434fc65bdf48179a21e0de04c1f1d594673c9b06862e2ee48536e81df6782e8e9f26b720362681b524428498a6ab1709df44943574d2ca7fd13e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fad0041db0b146ced065f09430742e2
SHA196fa4944fde8e747c51ba2ea8c427706481627d9
SHA256adc0212c9ae8d8b896007217bb655da6fa0ba3d9f8b3dbd6f32a34d563567433
SHA5128af1f03aad3c4f6fa2877980a27297ef43022641559c9c8d4e5896a3fa2c7d6d870a07ba15318ba69516cf4d29b57e40e9560a5ec45171f040ac7ce8c0d75e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fddd2d6ffad231200522b4196d15c759
SHA1e07271cfdfa84b51c801a31878cc4b0fb0c7dd7d
SHA25647a21daa08593277c95bda734f2f8bb39540de2ce334379c216cad51b7c64b37
SHA51293becbd72936a79cd7e95f4848277b34f89361afc3efe5a5fd88a791fc48284ba6a9d0d00cf4230973b123f599dd72df5600b8c135af0270b950935c0161af2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b48d00c94c107701491cadc894c5904
SHA144bd768cccc44de2302ff796ce706759fd91d26a
SHA2564571ba27ac0d15471e47e9ef931e41b8dfbcad8436d58105a241125ed8db8662
SHA512ea0e05ac02ea0bf214c85dfeee67f57c2217e7051c2b63e4114e7e5fd53dd78ce634a741544f4318d493d40b06e0756c045eaa1cd9b3e58533066a6a1fe61940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57347615a9d04159ba1c678f20896dd4b
SHA1203288696f5dd2a5c750fdeedd3fab170413e85e
SHA25603555c10f710b0d40332cc9f20c8fcfcaa8ec76ab99b5e5c9c7eb8196e97b210
SHA5120530bbb95608ec4a81e102ed341ddf1c3fd775f80db727e8f68f15862b125941cecbc394665632e06a67674fed84590ea74eac0e6fc97912ca4431df52fa202d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bff6f0380768b02ec87cb039a4473c1d
SHA1e2f812064091af7c78cbfadaef49f986befd36dc
SHA25631b6d0e569e3f5f340177c69ca41addbe3a2f797fdc813f8dba2f3ade559ad63
SHA512b5142535ee5acedd2daab685c921b840a394ff7cb64b306551d8033f78e465b3d5392bc9f2fd028736b1b0335fb26583024d09c846b946bd4c1c4dd2c617786b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5008de0a13ca36ad9c695f9c0c150cc8a
SHA1e190b54259f0f8f06caeecc76a82cd2ec8a6d344
SHA256924d79a73e62133913523c9ebbdedbb0273fafd2160e4e9ddb6fafadd2343d88
SHA512f72a5aa9f8f62b1651a9207452e71f7640292ad1c5a273967f05935f822b7c6a28ade2b86a990d8f6efd65202d0fd2f8f420015e5814e6c4178cd7c53425142d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f50942de3a14d969e777a80876d0736
SHA1c9dbe3a9e19d752ba26a8a7423291619cee0bf65
SHA2561bb4509d016346a8e070ae907fb3fbeb41add99516b46932e9d73c520c68daca
SHA5124bdb6a83f5fa5a0e8591e3d51a7a7862caf9b1c73806805ec98e64659f8f303de86157aae2602a2976067c58faac5e1d8ad0658e5aef36120b780ee3fe90486e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b