Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
eab9b70b89430aec7012a37d8a1c7cf1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab9b70b89430aec7012a37d8a1c7cf1_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
eab9b70b89430aec7012a37d8a1c7cf1_JaffaCakes118.html
-
Size
32KB
-
MD5
eab9b70b89430aec7012a37d8a1c7cf1
-
SHA1
e3cffe5a8fa03610b54f2e3275833a54c0f87a8c
-
SHA256
e2b53d8edb615548c36f32b7fcc6b221a8f8c43879d83f8332800713595be3ca
-
SHA512
9201f0173c65885adcec879a6b9190b5a605498e93a213aedba4a4458f9b3315a93cd5f7d13f4eb2462cefb15678e2e3b83ec287fd7960544c6943ea00d8eeca
-
SSDEEP
768:djhLDJOHE4qEEwu7PId8ZAtDqCQl1EzGEe9z0K5A8U/OHwQBYvK55+ViCpub2wVN:djhLDJOHE4qEEwu7mqAtGnrEzGEe9z04
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000d5e2e2f0797a7ae248d02a94ec68f0ea8240ef9867ab2e53b06ad18fa2f198c8000000000e8000000002000020000000a0c0a384453c43ea4d977852d96953e73c1f3bebc703c44bf7cac812873fc27690000000b70428c43b8c5ef47cad6640439f69e7bcb9c4ee86287a58c651ad5db751bee8559e16e1e38bb6cfba08b6f8523377ae56dc46febf30c4429bcc2817fafac32c0ba16ee8e8b2de05df60f46abf24276b285b7690c56b17e5df07c7286dadd6466f1256db45243028bc2310e8d25d95f8b0cb217fb2002749ccf84b48b08a8a7373e583e2e38a695f91423544da98264e40000000e4788cc970be108a80386fb7b471ecf0fff80906ce73349372aa095248c788f5874d1892f8c6727e0a466053e1c781abf14be6d3bd67b8c6be5e375eaefe2991 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887802" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F78E451-764D-11EF-9C13-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000081c8b066b249e81607eb3940b45e8e3b7ffc13142fcef64501de886b073bc958000000000e80000000020000200000007146b870926c8070726b88179a3230124834e61f39f4003f5555a8b51d101caf200000004430cde5311a54d161be4c27f43070aa0c594a257f8d3089dd926d323383f6a9400000004011e3a9984f6a32768cb7042ef3cf5232caa1a4ed3f3832dbedd2e669428ffd145887f4e0dab543ee4865a1ac82dbcc2fdf2d9797e07354f7123ee7a6b2a92f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0c895085a0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 1616 3020 iexplore.exe 30 PID 3020 wrote to memory of 1616 3020 iexplore.exe 30 PID 3020 wrote to memory of 1616 3020 iexplore.exe 30 PID 3020 wrote to memory of 1616 3020 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab9b70b89430aec7012a37d8a1c7cf1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5271da9167391437e208edff30ede2875
SHA1d00142c0d581cb7cce1410c2708ed83aaa18c139
SHA2569ffd7195a03e51cb419882f009aa5da6fc05be32145bc12bf9ea313d1381efc2
SHA5124be1ff9247989623cb4df7ab541871f6d042e643fe27da65dd3a5fc34547291db13e26bdb39af6c37852a190e8b40a3c018bf34b28f419394ce761857309a1f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5795ed537be0f4064d4f5a03a4435ef69
SHA18f644544ebfc225a4814d35d547705deea65c3de
SHA256d0ef3dd9c7fc9de791b0d1b9a8bf5bc8835d8265a2ff3696a1f9a1ef3f51f06e
SHA512cd90427b929821ad536a415280cb4f2a473c92fd43a1e56fade70e738f878d9e560d16a7ee5f58d85f1123ec4baeb2836727164e989c7e2596af6a78712af9e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5110f0090d281b4929fa158350eff5a01
SHA1174274acc41aca4169041d0c4482894f157e3941
SHA2567d16c58368d28fe820e6bc4048049026482d259e95dbafc8dd26048302a99349
SHA51229143592341c50e5b697ad146fdca703fdc9254026f8d578d98c223315018649a832137b629a95347cb49640fb1a5a32069bbee3878516f7566aef777a050344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e1354997d7160164f2c8a9de3f5993
SHA18ae3899748f66d2292d4b70b8dfbc76fd61e236b
SHA256d2f62ca65b97e96dc1680eba7c3b6f97072a8540ef8f10633109e4ecbb0f9a16
SHA51221924039cbf5846e0331ca7a9a3f770171c7602e212fee090d08836b3316a547c6998b3f12cb4c8a52940f9c5c0c668554647666b7dab3ede135f8e04026f00a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5818a3b721b345a17c79c6cda3fe81c09
SHA13cf5f954816bfb80e2d0c74c7a31cc7d8eb4376c
SHA2565b1d9eee25322b5d37e768a1ed2702bd916ac952075c6ee86974cd827508078e
SHA512e9c219ac88fec62719a39c005abef26c8f5a9ce011fa1f29b758bb3dbc630777a1bf1c78d17967e01ba60ffe8625261f200131cb6af0b2fd47d5d09145a0af82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f12c319892db6e82b6d8aba9e9277e3
SHA14b42c7c631c1d7d2deed86dd5257a4af8906e201
SHA256210a72984f43f4f4ee0e094bcf18319d0a78d3e2f6f0f3ce4693c53f3c17b1d8
SHA512c06a09550131531d81b002a866a10afe7b86abae451778134dacaf638d950dff080660255583e556ed46bef9ca3038c2ed0f8230c6adbb11fa5ca1dc1715d03c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa09df21da55631ac2fd9f1cd97e436f
SHA1ae13f7d7f563e3502eda66680f28d27631b81f61
SHA2563516d2a6f33dc880bb969384ec464adfd7e57c4e8091817fd1834d3447734ff6
SHA512b3ff0969fba828dbb74c78328557e24e4126ba9a9d581a04ed7ea89c05e9bf62aad0f84c971e7eba3036b64e369878abc3ef01d8bf0a228ced80274e876a58de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5026d6daff5ab17786f84014f0674d937
SHA1ff88a2a38a4a822280aa945bef2b56fc037cdb86
SHA256961941e8f59dd2ca671fd8714007c8f0b991a0836cbd566bcdf7c3826b2cc87e
SHA512b1dc33037720f340f276177d353e51dd3a0583d0e3361c9dddd492d861aebb3619322f25f61f478d4f0ae9286101e603fc3ce4b21b80e25b33c6209bbd5bd087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513bbd1553ee4d885138ec79a50972278
SHA1c7ec5ebc53f8837444600b62b9e0b208dd2ebbff
SHA2563e670e435a5cfc239c9afe9926de06368feff2c281fc421e10122ba72028a679
SHA512e9c8494d3bab3d86778a01ecebce1f8b70968d076646b529379c4964a9cb378dae855c8bba8a3cfbea9545c238f25c89c2c9bc5849847cb3d7ca92c69d5edf3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc7eef7f222b3c625669c95407d0aee0
SHA1ba40e82c02e77a4bcbb04905a30c6885c4c2707c
SHA2565245f67fb1fda2e4caca64ddf6b4dca6beb772d106131e3c84d62269a80602d3
SHA512f3d3cd7984d60b6fef6d6c3f91b57f05685b384c500b2bcc169cf64738b9ad9308ac0af82895f662766f5200845a8f89ccb297009eb32fccf6a20c7afbeb1877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6e1bfa62e5ed07a44b6c51262ccd00
SHA1625e6ce9c4b5d0e271191bebdbc29bc5c7d05ad0
SHA25689f5d49109cfa7d8e6bf00c0433a8d911f149a2452ec849a88d0645d71ad99b3
SHA5125bc6227c1f54e56e63f11dd6e5c7d6663a0c1ebeb5c3dca9e6f249b952e8950dfe607657b469fae4e29609a1b0053b55debb1daae5c77714b6090f4f97af4a36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5779ce7c007b88afd316ffc63431f6bf7
SHA1baf805c340905760b986ba6241d4c912937128ad
SHA256326b60c989a9bea9d459928c5e80f3dcb92deecf6bf1a6950ff7f8c8876deef1
SHA512ff4063da722be6557a55cbd42e139c9c09904b2c11bec384a5de3cfe967a77a63f1ff5d724ba5ce039d6774c82c05dc7dca04b9aa577b71cf70fd336bb64f600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50549469c30dfbfb253f04150a5661767
SHA18e2b6c1bc5538377fec9e190fc16fcb7887ff1df
SHA25664c11a1896b149173048a45ee1fcf0a79b7efcaea0e6edb1406304c2c618618b
SHA512d8f1f3bcb23a0eb39c7bcbbf7c676fe73f6851f6f860adfd352b3dc38d49a1c409bd5ff177a385860ecb86aa8cc10a05b03d57c1633cfa78fddcedcf9080797f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582841e951e094cc54812f2c9234ce7cf
SHA16d8eb9944d917811fff4dcda2b26e5f08ae8fce5
SHA25634e9e38017f8e68517349ce968f122ad20c7fb98b029a5406eaa639ff81c3467
SHA512e743d414f76a70326ba7ed312862b18aa91f16096e086fe5c7afbe11fab02e495b4a351148b9417bd45bf31209bc7f4e8a5260c7cdde85fd2270e047164d7c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5310ed11a489df1042ce9a2e24d256eb0
SHA174d5f5d6e27f25913980d83a5203cb9f4ca8eaa4
SHA256c9754d2cc1c34dac5984e7bcd628e1cf122a8589d16ed033a9b4e941deba17a4
SHA512f15d08f021f3b489a185e455665d38635b855e2f0e2674210f0183a87707b94a05e0096a92f1b00290f2d7c479ccdcd209471beccb12ec3b821ee30025935b3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dda9f400e37929ecaece9534be472ed
SHA196e7979c8f502f7445cea2ba1bb60bba692bd789
SHA25631ae0e77e32af3ef0a39d2fb130aebefd83581b5b553a4ea5cf271d7b401746a
SHA512e9b99005fe40257622fda3d9a3d0630026e56b8f18fac97484643f7dbcf53a52f905ea206b30ce41b986453c7a9325898642c468d6d5aa0d4c92d6b56927d24d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509febb12b6ec2e5d35df2bd70d835a15
SHA1ad39182d725a4047ea37fd98852352f1c31f8be6
SHA25610467fabeef5edb34528377b372cfc1fa974d2b98090644b784eae35cc165d3f
SHA512658fb5ba2376534105349a59c9807a52ddf77f4efc0b0c9d89dd73af62818cd32b6d62255a53322e53f4b548d4aa688e459c1296ebda3ea497d3c01396a7a78d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5012627d4b31f6c0aaa5d3e81d0495955
SHA1ca78cac25b36e79a2d1e82700d0d09535bc5ddf4
SHA2568af0d0d9770ac80ca8066652dcdcaded0ed9160425ee131aa85437d0bd40e128
SHA5129925464b9005b8e329511aebae892fedf9baca46dbf7d13790421988337c0eb8459b85215374d0d48732cd4efaa214ee3a3b12b32f3f1d00f342e900b4330af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5160815f3b2bac5a3611de89145505fb5
SHA15aacebd6eb120c826a9a911f5116ad395ea220e8
SHA25601142e56beb6508c410c597894d72e2ac06cd44971d7e745f8b2ba202c03dfe6
SHA5125443023da37e0a35fb33ab9db6000e5baf20a9ffeb41fd9ad9fe196e669fa5fb307a4024f0bb1f8b44af3a531170394c7e21227ff220f10e2707a09514af298e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b