Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
ea5aac8f5908fdba43bc91333e703836_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea5aac8f5908fdba43bc91333e703836_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ea5aac8f5908fdba43bc91333e703836_JaffaCakes118.html
-
Size
4KB
-
MD5
ea5aac8f5908fdba43bc91333e703836
-
SHA1
5ad5f2cf3f7c95a298cc0a585c4c12767e7a1b6e
-
SHA256
069f30aa75507a850ec17dece506343321bd7ffaeb40a0db7af4cd58b125d001
-
SHA512
ede2e6abd4191676c645ea6660eb5794d28b6b4268344ecc6a6ceb8d5121dca6c1a69b06e1f52055afccac099fd9662e96df54ad6c2193d84d39b63b14c6452d
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oFttyZ0d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432871828" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1095add2340adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE361CC1-7627-11EF-8002-C6DA928D33CD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000f8926d6f5e48eafa53692c2bd47eaf8f3e5cbfaa907d8802cf4f3c3d397c13c0000000000e80000000020000200000003572a3d40354fcc33893c6057565c5ae29054dc63b8243f44bb5ff983371077f20000000fff1ed98ed713824c34f58faafff35d3686706be36decae30f651988aab980c840000000cbaebede6c1ee63202d4964bc8033af52f970fc1b138fd0e0e322ccb18a648d562fd9ebd6fd10c10948946f8a72ce04db848ff08d4cd9e0127fa8738e90431e2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000005902c15195be62897874dd97f0ee2577573b17a621a95203761915ce61c0f6f9000000000e800000000200002000000055deb4f5f9543bf4c529e5e910f1403cf46a73ab6975e5cd8907872df6c65b6190000000ce3ec54d1df6c7ad0ea10035e379c5ae4836bc66b742270c910290417490514db544281747dff4dd1e198d374f1f5b3dcc4d0847df34307b1960d0f900eb37846a64c71e5f87f7df18f2c00c16b487851e0c323822a432c9c0de93a9f3213491d49f247536ce5baaf99758753e2e04e042994a2c669b91cf95fc5dab2c6ea9e6d5a7c0149b6fd17d52884def66f4424e40000000f30373c62143c91f643b746cb84ca209a51052322a59e1f1c7c74955ff515ba76c75f20f9573ab5444e42eb0b0bb07ccc232298cb6a28a4afa0968e64bb6f8a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 768 IEXPLORE.EXE 768 IEXPLORE.EXE 768 IEXPLORE.EXE 768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 768 2168 iexplore.exe 30 PID 2168 wrote to memory of 768 2168 iexplore.exe 30 PID 2168 wrote to memory of 768 2168 iexplore.exe 30 PID 2168 wrote to memory of 768 2168 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea5aac8f5908fdba43bc91333e703836_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bfefd2c91a1da9e64da573e5de7187e
SHA1a859f2472845eb90e44c375c409d50e225fe626e
SHA2562441f0d8d937b78bcb9609333e0c7686482475304f1964dbe87ac27b3a03856d
SHA5127f1c917d5d6dcfb30a8a8dae7cb9d1c9e99a8fda63dc68d8e397e01908c31567e5f2252c9f408752b99d95ef19a9e1657825fc646d5600f87541925a34936019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b44022c7fb6e423dae06f138cacc8b6f
SHA1e231502941374bec1a12d8e7db6a2238aeb775b4
SHA256ced1e4d16fc0703dd898102185d1dadc1b7d95cfed1e08e3e4318c0201b1c664
SHA5121bd8503b33e6d927b0f12cf9f14626d3b99471fb74843cd10fdb56f6088d1d2f922d18261b3ad4b6ccc97de31bc832c5f8f654d516d8e9a9f103c4815eb4d37c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a67c1132657114fc8c496e96a820d140
SHA1704187760b481ff91ffb2a270c781370adfe1dc3
SHA25648cfd37cfba2132e67297095675515ecd598efdaf3ca968bde2dcfb559de5d57
SHA512cda4f9f2db63c6d11147d452a9eb8ab9c5995c97864d62f9100ea4b92c474b97c3f1e7920d31175eb1d1b3b9d0f50acf26baeaf9f47e7ee103e1b361fd2622f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cddc3725bf3c233c4c9f04d3f4d66ef
SHA19c6556e89400addf480459b370414bf20e31c67f
SHA2564b27d6db260c7680cfc979fa6fb16bc32edb1b6a61ae12ca1471758bdfeb3318
SHA51208bb61e5a362e866f351c73771cb7dcf35f078aec7efa7ff7d9e33254296ca58bdb1b90092f13636480ea81c58f0ff547c2f5e76cdb201d1b277c31c175d3877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a3c734e1e993cd70dc5df801d74794a
SHA16999d98feeeefa6bd6f2f36ef92b909530ebb7d8
SHA256b1ff2d2d03e05d949dc829232c292d2ba0544a3739c33ef662e1d23ff636c2e8
SHA512d8835838e9b9aef8dbb88cc5cfdd1580e535f85a9b8cb571892870b573640c82d501e6ec2a2b465f9c26399bdfd1f6711fddbb3a06c9961a249424241b4f44ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535231e9247b1c34987f871427c3306bd
SHA185814d1a111e515a13627e1ced6589f268303286
SHA256cf176717a48d7661b1171c13eabc959b3e051e67b087fc51f36a978030401e5d
SHA512188fb51f60e716b6cb5638e7ebe079177a6276928b141e77720a7328fb0875cf9dfa925fcbe4ac6cbd1c6bfb1419a55f121822952fe4a3f4fa275f996afe8b34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550f2e5ef13bd5b07f134481410307653
SHA16b029f74d8b47499fce1b5103546e76526b30478
SHA256689b7faa2ff1efbb588d03f85280bd9ea57ea895eb20304bb530c1c38015fa11
SHA512b69824ec2357776a7a0836da9e6b3d0878a0fd9eacadc1650fe57815970a7626dcbcda9b2c8ba9fd9564be066706ffc44e39260927bd0a9c33126f36180d507d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd2ecfdeb9758611cc72a2f89d9fce7c
SHA1278dafe09f1e29bcddd84613cb62ae902bbeadbb
SHA256cafe2819cc26dd290784ce1671c166fb33f28f191f9d9867e6206e24d9494f1b
SHA512601c7ade236eb686716aa30eeee8d0166c9ae10ad114f2c42b8d1452b7a2269a592179d97643f99efad3cf11f037e1f9fb2f15a11418a76d468f33895f1f2467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598ec1e5ed19fad2a30adb6c78cc8f21b
SHA10af4b3551f3842178e1fc8203ef71a04e921849c
SHA2560a3e24e4b3051b78022c992200f1a302fa304c3274648573acd066c0467c66de
SHA512d0da5a789f0baea2c4b55acfaa66f7f0600879b18b2e8952f2ddcc5a5ee2bdf1d3865c3c5062fccd90503cd4022a6071f5673814c94903efbc390a3bda967812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2fba4307bfdfcadc71c6df8f282facb
SHA18a03c1bc618f7ad3c4ebe1d5b5c1b8e788fc437c
SHA256933a8224dc7896b546928c0f0cbcbc574715cbfdb05e072b9e8d70739efbef34
SHA512267e9d60031767bdd66edbee9490a6fb850c81c81e0946f046c12d38598e2314c70b6c5be3aad549a9dd7f7d7314a0723efffe722698c2c3e73696dbbadc8e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abade1814b3d6af14e60556f34605919
SHA1c612e8938b63716ad6afae49696bb426afc67689
SHA256833f6a5c7f56bc1eaa78ae1bdb85b6f31bb8e93e019d7d5e6777b3a345236ff9
SHA51270bbeb2d67e35b3a72be2e7ba22eb4781ecbe0a31097dc1b4ef1c4a37d9036a1a44c74dda82c291b16ff959a393faacac446f3943cda0b379cf4da144139419e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f934fdfe73552aed001def0e93f45ba
SHA130a6bbee58fe4c445f07b9febfecb37beb192298
SHA25628b560265c236d0b36a5580496a2cb16e527a3976615f45f71d630833d42fe0f
SHA5127b1d20004b7e39b2f18a5b73195222b44b76dd78fc15f2a880d64f6b9a512d965ae8865e1a1c63a6f68f3719cbe309f0f72aa4c57b3a52fbaa4311585cf773fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3b91f6f2f608404f58718cbb57fd8b2
SHA17017b861c0d050e592438ae065e58bad83ab6a79
SHA25616a144fc067bacac826a608ba78d8817dc3cb939ef37c47b26b534d72607d30a
SHA51238a20f835f5df9df5e8222ff5d57e5b9142f50fef31dab854f7c1f02bb54179d556b9ac8c546456fb08080b6396cc73de8d97ce53ba0c0054a2f34f917537d9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525e22ee5b10daf6adbdb0b275d8e416b
SHA16a6a3cd0acd5fea2f25ebc5243a98d0dbb44dd4a
SHA2569ae920ec5bae3b782454d6a75728ad0ac3173ecf5fe2d38e5f670e8686fa537a
SHA5125df9659ed71826122237f8a3a585014ad78d2caa52a8cb0067dd4f56b0937a2188c1a468d968c76a52d746ac8bffda0864be70aa973531f7df63aa95c11de52b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d7dd64a3cd65698b2666a71388ca460
SHA1df8f91e948851bf416362d4c8cbd2fea0a011cba
SHA256c372e390dc21f47188952fba7be9a53e54a9639ea97205fb451dcc317c968e1f
SHA512254127029124a00412b25027a543bcf8d1064b4212fb3f517c73eef5518c677a3a271344bd70d1d0bf4fbd7014864efaed768b3ac11dda36bb470d754a1cf27d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7c845598312d025c4796d9b2d5db7bb
SHA1446e4a47e9537d0b5a62e6b88f60fb3e5855fb73
SHA256fec0db1918a07841a9aa5c0c72c6971e56ae4fda2b41ce3a1bb503947c9b6392
SHA512491efb2904d4ebfbb2eb0f58ce583f8b8c04699df6669b4abc9f8f3f5c791ef41ddaa4c135688934c7749c99809c80467acf6248bd3a00b4ad0b2ca424d6d636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504ed5c713c737fe4efa2a8d20a6a3c95
SHA1a577ef6649ee9d87f28d67b4967f41ae8fbbf94c
SHA25608af05301cd3f540b7927ae8a681103730d91fc4b01fbab4414f430255585e3f
SHA512e4f03886fa94d97c72d937603826ebaecc90c8cdd42659ebe53b8a56ac4ac7d8de7d61d50682d29657f71d63705013e5ae091ff59941a7e75172c5795b9b8026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a18797098ac0cc8693bf7ff9b4b985
SHA10d419b5eda0bcaa9485ac5e6f91a286647a624f8
SHA256f6c3b50fc4cbf32269484b82019a432d787f62a558838cc0cc3884eca07431ee
SHA512302f072a85f22b791cef133357b92e619a00225104593bb1e9f76d9dbdc901409400e6a9ad1e218daad0ea9206a001a0f2fa6c49ec5785d0c3d7824a3d3fa9b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53791ac99e3b6eabc1a9fcbb8421aaa67
SHA1bc90c8006b2c5db247074342961ab557ec848f5e
SHA256e051c40a1943b9f0e0939d3edff8f5569eb90c29a5eb17dc8b7af08fd8e35b60
SHA51244fbc62cb6ed954a8dee1b1241c934a15f1d6ef60adfb99b537dae1ba9114958863d8f550055e3768d7025303e9c214c3347cde36947523776f3e6ea9e831764
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b