Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 10:57
Static task
static1
Behavioral task
behavioral1
Sample
eb310b03bc0361e7ed1db9fe3465554f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb310b03bc0361e7ed1db9fe3465554f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb310b03bc0361e7ed1db9fe3465554f_JaffaCakes118.html
-
Size
460KB
-
MD5
eb310b03bc0361e7ed1db9fe3465554f
-
SHA1
797b69eb9cbadf013d1ee133f945a190240d95d6
-
SHA256
9a42d5209ef528912e5eca4ee094a86727da1211c78d57ca7f427ceae1daca60
-
SHA512
40a3436cf2c88a28bfbaf2c50a0ddd1c10855d97abf36124a176e552d0fbb3cd1b9fcb6e6c8995877959e85361ea2db153c2f42b9785022c22c45d0695207449
-
SSDEEP
6144:SRsMYod+X3oI+YYsMYod+X3oI+Y4sMYod+X3oI+YLsMYod+X3oI+YQ:o5d+X3o5d+X3o5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{04523691-7676-11EF-AA6E-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000039376723654ce10eb045bc6d978988db3e1efebdaaf4b1b8554104c5ba15728d000000000e8000000002000020000000ece3e724727fb6713a09bd8a670efb46a467c1fcc2dcafb09102edde6300400420000000fbcd038fc5800eb4ba13855cf6ef84eb8e80379d3a6964aeacd305af3ed5512f400000001fa80c9c33bf7e77e50ba61f695cbb808f72002570e145e1ce555007791b9d4ffe20d764cd4a4775b89c1ddbb0fdbc1c734d3b74d553deedc7beb64c03c55024 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432905339" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000f1a10d1ac8d5a7a964c0cb4aae89f63f59d9f05c3c70562ca156225ed608cc2d000000000e80000000020000200000006afbf38e87b83f79c2df28318d911d915c19cb8ab1828ff740b5e5502f92928d9000000099cb15149f11e7fbb741cd0c53680afc7ecb5596ea9f7db4bfdf4aed975a143fa686d1bd068cc03058a5dea9ac0527cbb8cb092ffaf8443d5c4e6127fc0f462538fc0b3f5583c094b7fb31b773e7e17586644dd255d1fca9d9a1b91fc984063c41a85ca93e33acd203599dc4b793894b6ad93b65200a517d9b6119df17c36d1c32eabd2b23cfb70e8d6dc48caf24943d400000002a7c3821c44ed9c8e45ff70e72c680f907a499a7fdc658b2f567a8bef452aba609b129b2a9a8d11f23daaecbf98ec2306f5eebc41c012d96895fe9eb102bd6fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 206c62de820adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2340 3044 iexplore.exe 30 PID 3044 wrote to memory of 2340 3044 iexplore.exe 30 PID 3044 wrote to memory of 2340 3044 iexplore.exe 30 PID 3044 wrote to memory of 2340 3044 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb310b03bc0361e7ed1db9fe3465554f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb19f3b62c239c2a3e90bcac4ae693bf
SHA1c36ae2e72b49f0b782bf94251bc6c63c07023fce
SHA256daaa2c86b2d08366a292af4bc7e85aff5892de95e939dd3df266850c1988d58f
SHA5128c0b287b7681fcc3262413c1fa395a5e420b46f202c797ab3d7d2ee01d0283e5a1e8c2037e20e0c20f1ea9b229efdcefcc9d528d41577e5d788cc1f1425ab1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7413f279f25f7d5c1add0f41ee69582
SHA1212e7a7bfc0df21a7fc7f171439378cdd16ae6f6
SHA2567062b6db4d66f815f6346cce9b357c1ddb2a26f10cdca26fbfed5817a1fecafe
SHA512ec1c30b833435e6c9f959d172d3fc9bbb6b44ddf44bed2a9d22eaf7e6e6d973e6dff80a3fe91bb41b87a3e391797f6b59b9d4d3db4e9c26a7960201fd5645b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564742ea13c7583e6d185cb4f78dd6159
SHA10f3c46bcb4499ff2ad1dbc405c4d0f7840c6e601
SHA2562e8e842859782fc91731477c1c48afe16a84a519aef8f1cde91bfcb87938ab4d
SHA512d699182a7c5d73245950f7c1e11086e74b4e1cae51ea1d666c430d3ca4c19788ba1414d0cfa39f7537ee6713039156c976e2f76545b3ca6989e294edb665da8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55737a3b3caed30257f9b8bfabe8a7d1b
SHA11926190d3d19062ee2dfd9be6051525ec404a5e3
SHA2566f53b0c1aeb97765bbcdf2438ac324c402dd971d2717adcefc10324501c6a99a
SHA51251c55dbd9537500720c2b717243ef12fc1e4c0cb3f5edaf94e31f0a06f08dcda347d08bd0bc2695ea86615e48611c33b22830e5a310b9571b4cff212a9f1b7c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54029943d2c2d8ee535c8de29a0e9623a
SHA12b5353da73bcb4e84b87933f7915e94ea73ebb28
SHA25682257890f530f038bc0e37274b4c55e3ac9f4d5706623e58699262406a1ca727
SHA5126500dab7a7de51ef6e33c34901314285723e1f6a0d37b9d97b66e6ce9000f6a0ce445ad3180117ef6833eb8d8b917b2eb677814b1a46809178c138b99160a41c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518361f632bc7ab8001b6e68da1c84328
SHA1a71a9e920cdf3e6cf71dd0ee95c00c1e9bff2163
SHA256eb4bf4447c240e94ecd2ddc968c1b2ac7bf3c9e1d84ffd2804f0d54c504f69a7
SHA5128f116ca66632d19db3076584fe1f543cb5b24a424e638f33a90b2a6548bf86c83ddb1d46f0a82e2e443d268d2aed4b21182a8861a4f30e52e65b5dd135e9251f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5365b7a5db424da9996063800c4dfff09
SHA1eb37d836b0ae92f1fe3dba88fb436b9314b0b08e
SHA256949e6c19440a575fc6c3a20f87b41c4f115d122c7ce5a55403815ff801aced6c
SHA5120f9394ffce0a5218bfc123acc1ed47acde4c778e8c6a098638650738a871e06b4057bf059569dce59e6df9ea8374d5df1cec65da8cc08f3fba634cc2adb7959e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d5fd1d57567dc76a17bad89db57d178
SHA196dafd3f9922e049c02487a50612428d33d42877
SHA256f630ffdd932d6199caa6e662553d7c6166ec19d5cb632d17e2b5401caf639805
SHA5123ccf2eda99c48282269364397d137453339e68dd61ac38819d03102e909666695305b69f873b250593df593bc7026a780fd53dcc25c89b6f07ca5615cefa93e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa9e8734c941a6a10828c43d0930215
SHA1ea82eb9867d66b8b0f6d98228b272a6483149691
SHA2567f0f6827c95276effdabcda564db712948384a9b014027c958fc658f4acc63eb
SHA5121bc53b470a023d651636f41677be9bebfe03f482ad1d8c9550b5dcff8e1cb69e24fb9e4a94045d9b4d02a3854a0f679ddde691ecb31b61d2d53fcf6ef67320aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d25ea2a2e27311bcae6cd6755a7ac0c
SHA1d8c128b9883f9c098b5e4514bb25925f491c5c53
SHA25659fc54d9f3c435100f3c499cfba98b0b6c74f5a17b350e699098c75dfe72248b
SHA5123630f4907e4ef66fdc22d254df7ef0bfdde5e69fd527d4dcd3fa771137156bde90bbabaccdbdcf9d431fce6412898e76e45ebf66c737537265e75e5d29ded04f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5320328442de0b4d5946b26aea8cd1d49
SHA113ab19c6e128139fa67ea9b955c233bdb3e79789
SHA256d38a1f1bd7bfe66bbea51393addd7ffa807a9f27f4e73f2778258af147fcd723
SHA512b6e7b20fca4c480afcd15d994bbe3e935b3e1002ed105230da9a71d63099a6c27e1f293afc0af439d55810a1fef2fb5af6f6f53efc9792a8918827a54ebe2f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5116200737d9b3755e66548a452095a4a
SHA12b088fe071a11763b6f6d480c5740514839250bf
SHA2569139488a4f713289dcf9d1490e6a89ba53a68bb919d3a1259ddfd0bc12be1cef
SHA512ab292e7dde4f1c217a51188603688828467f2238c1765e3fff6ff48b6f4acf270146c8a108b3c8551ef0fc58baa7cbc1d24ad8449543423ae88d8d4881d2679e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a152e55f6cbff286d875075c0a6a811
SHA16e4d4fc93e327e5d19ef23e89b9f145c5c57a0c5
SHA256514618719ae76ed1d7cd3b7332d2e64b00b634367ee2be267b00ee086676c136
SHA512b431ca38fc53445a0f6a61e45db66eb91405abf5d1710f65ad24fadab72585a322054e509e15e1a1c9e67ce8cdc8b643e0e00fa8487f48ca22ec4d4fe1af0954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570bc2ef2f656da955c1b97fbc7bd28f2
SHA15bee1ab8a0cf49c38cacc1e4e2df586aed4d1f80
SHA256f1ed79f0a95af86877fdb035968fbce1d668dc1e3b9d7636ecb24d6787b987a1
SHA512db4bb4dbe934843bdd6715764602b5609c320d030c0f25ce967446c9a66a809f1e7d645eff28d6b4d85b49db8a4c58e7ae1cdf5893e62f8b449672b446653617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea8f0f3d943806d27b3c2a83a8f4bc2
SHA12c3071afc5dfdbf6cce7316a7260f0548799f7b3
SHA256c132d9703dc3254b5d7d4b5189b8c00cff23309c5400245c9ff481b1e145aba8
SHA512bbe4d138aec5ef37a9cc0346d2ff10ebeb159b0d773a57e45bb317597197a89c9897da00ff406955c2230e163b9bf7d01399c0d4b73c72dc4924fbb9212254ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539f892221b6c212441ebffb7316a8681
SHA1922bc8a50738c46383dd6f3d09e53d9e2d727cae
SHA256dde03e85a58344889d4a8a56fbadd849afe6c178cd975e94cb497429461b0c09
SHA512fb5bffbc8851c00a82ff8b586b14b557bd83746215a82c3af1533dd7edbfb6316c88faac35ee70040bf2a2803b5b81e2ab26e82f5ef3a92d8a5081ee08e05049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c487139bc5788279c548f956f0c3ac76
SHA1be90ba80bee1b9393fa841b030d83128358cfb73
SHA256866879019119ee67adee483c337d5d2cfaa0b45af8a63d8705ee1b1dccb54e0b
SHA5128f14347ae659306cd8093a86aeec7d0b3162e9c4ebfa0b4b0cd6ab17d3f9ac25429c3d1f39559930eedf7df06ca212d5690d8071f4e11967eefc17617bf83278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540e8bb731a417e7974dcba4653d66510
SHA1d903b05834c2b835678f35c86fae4b02d7a56e04
SHA2565190cb620dfe39bbff40e388f74c8fa3377832bb25a0ccf34c8125c17f2eca60
SHA512752bd30ce2b5c667ba41bcd2bf30338f26c537caf06ca0f0054502318b999210850b17db5226413f5b9608c5c4bab60a4ba232ba85a8980e67b1c6d6853febbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dca7e09802b7452d037299590d0710eb
SHA129d9ab4138a7e38141bd3caae63b8bd51db90cef
SHA25623fbd031dbeca17d51d4b9bdfe122208ae96098fbdac23354d4ac04c9486ee62
SHA5129430c9121c464440d3ca350a078cd863ddc2f196eb84fba64098de827dd3364c304a496188e7cb8b8d45bbb5de26c8b940df59d183688db2624619fb0a247841
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b