Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 14:15
Static task
static1
Behavioral task
behavioral1
Sample
eb816bd5158ebdf6fb73264cf7947763_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb816bd5158ebdf6fb73264cf7947763_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb816bd5158ebdf6fb73264cf7947763_JaffaCakes118.html
-
Size
45KB
-
MD5
eb816bd5158ebdf6fb73264cf7947763
-
SHA1
6d1558c8e1c6f0a6d8498c9271ec3ed7adaa761e
-
SHA256
5ee916587069f4e3f721f339bc2219f9dd075e72184e7308e03bd1cf1c992efd
-
SHA512
905065687ec19370575334694ef71dd63beec8af9a34be07eb8edc2238291f1c579d5e262c89e3bdd2d7a015e3a8e09984351d56e1d7897ccb4f4a35cbd882c1
-
SSDEEP
384:nGAC/guo8X/CmsbRrD4UeAVx/cQV3g9CxGpvYdWC22Azxhmq26GT7joe8Jqmd0lc:nGAO5oy5C8p1hm/Njp8JbKQtv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000023e29234667212892cdb42aea15655917c48f0e96225f6a42fb18d269fff522b000000000e80000000020000200000008aff53b8d73e7c4ae797570f0892a1b185a80bb8576db54868f8e43cd687f82f90000000becee31d434af84376d5b0b094f390d8df84702bef775c427e6cb1ebd440074941101fb3dc8fe78eec53d4a4ba66c04d73645308f049418ab3149ba270abea38a713e329264eb2b68655c323c83541e989e33b0a9238c791c04f47b77f9d73219fba495fc826f65360907ae7372d1878c4f7cdb186cd416d7eac7887315f527be8e8845cef9b97ba5cfd879561deabb3400000008383f364017f54129af7cf7d414a79f69af0b97be5b610473f75511190e1e3fc343e2c69c722b931ae18a876102b1ef9470a9d8947ebca3d984c82b381708425 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432917190" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 209d54729e0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B80FCC1-7691-11EF-A364-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000bf4ad0620671f604d1f800610dc966e41e67aab2b346d7fdbee992e752d40309000000000e800000000200002000000095c007df7f94b8742bee1b0b805908d808e4f4e916d3cb9d4ef3a1bc438d38f32000000017c1233755ce60d72bd5606a78aee2043ecfd272d85895f6eee3bcd7b63fcb6a4000000092e50d54ba7d76edadd5b144f615be9c82f5e6197110992c07a49dfdc1efff2af4afb56013e7fa89c1b1006047dc4825208d622f37c2eca6b4f5776be444bfe7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1808 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1292 iexplore.exe 1292 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1808 1292 iexplore.exe 30 PID 1292 wrote to memory of 1808 1292 iexplore.exe 30 PID 1292 wrote to memory of 1808 1292 iexplore.exe 30 PID 1292 wrote to memory of 1808 1292 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb816bd5158ebdf6fb73264cf7947763_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d2b1eaed8cefe3270adf7cc59d4e292
SHA175438a8d1ccd5e3f6e7404f1af2370eb49d7ea7b
SHA256918107eb638cfe653dee2a17817752010485952e8ed53a744ad6386b50cc131c
SHA5127fb15782711c6ae0735f0d99fcb633d3501bb33a1509e5cb47958cde487224613253cc4b4a2bbf251e118294ae4becb76e3319f623e4a05c85a726d8c61edc5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a0aed860622ec80a5912fa5bc067c9d
SHA1cb4b0ec68c581bd56224061909f733cfdd7c33e0
SHA2560a988571bff6402f8124c96a4667c49dbcf4625e60d18c19a4388dc9f4018f58
SHA5125c42fabada5177eb2f71e668a9bbe0120071ece702ce4502fe08b51016cd0e77fef86030a020e4957080c5c5c9e292275525de5e086ab71a7d82764bba3bc739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567fff8360d53319418b0e33f27d48da0
SHA1b93b02b03f0796e333f99af52a53203619cc00af
SHA25621c97013542441e00763c1e9cd112a54d63ed4cc4ce9fb2839de21204c9cd118
SHA512352ec7a35d370728c7eb80e5f33f8e28b2bda369598f611b2a29cc56b11f4be089ae86cfdfeaddf10092e25ae0f73ba7ff1c1b4d7e46a9f63c35c02ecedd92bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58315623ba63a45b2a07e0d505ae56c41
SHA1395bccdddba37cb3691055027b3efb6c6165ea0d
SHA256d3e101fc56d6f1dd9d45a0bcdc54805d914bea69175d3e3dc98992c38ddc760f
SHA5127b2b89c718edbbd82af7589e375c99f130855c8d682d2f39e9a4b7a2b874323f8b82330a811dc3bd03948a87a45d99636e23633808e861afd0e540c72fd931c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eed4df140979f7d125773dd539eee9ae
SHA1c04be94c1a5cc84dec385dab6aac0080d67b54db
SHA256f8467bac61da587bd2e1c3e13e2550e373aa17f38fa43d9b1b069b93d0e6587b
SHA512a86c1719e3098f16b3dc635a2089e3d9292eb53f2b6f91d0c96d8ad51129a2ff4daaa5842826a8c2263598906e87b5fb411eb1dc9b33bf93a74acb96692abec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5732669a7ac78fa35583ffda5b5c70767
SHA1932fbd77814a103e92c2537ba2cfa5467371a37e
SHA256588f3d6f7bd5ff4d3c60d407d49fbc58e0612a52944b26990d7af51e6dcc360f
SHA5120afbacdc4aad7ead60578d0996a2a77ac3b32a70b96563254318819d2c81a5b72316832cb41638b468264acb034e1112173b328f2114786193126a9e7ec456cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5995751fb585c6a10d5a253c68d51710b
SHA1d0d6bd2fec411b002079a2cd3ec97ee7788c94c1
SHA25617cfc9e7a40c3ad62d19e4feadfdc8155b26f3bfe087dac064b3ed2ef1aa706c
SHA5128050940b9214ae9f0f60fd9f590cfab26abc7318438804eaf183226b2c815cb4d0af8c48e39c3be58019a0595d17f4c6196f623a2e74587711545bdc06a5701e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ecdcdb84b0cf1ab1082c2f241a7c833
SHA1da7673a6408ff1eec93ad896cbe275711aad39f7
SHA2565b5c2829a5b7955f41760de695f4f2f5773709f79266a26430e7380da9419092
SHA5128520be3f6db368f33de689d829a59da7ec7c278e80d84cf0ef691262def089aef2234be5c76b33b1919bde9ea445e4aaeedd3c1db0a241ddb1c6b8fb5b063a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d947040d6f7b08e50ad024af8162a76
SHA1f2c4f47cd1e101fa3f57972acecf00dd0f081aa5
SHA256e4c466a359e90551f63d8d982a3d1913ac65f5acd437873d1c39eaa87da247ef
SHA51239f15b13995ad4862630c38cd96af30be191a2640ec5f180dcda45bf1d0686b7a102173e661840ea62160438d95f510b0809cbe1c660ebbb099dd193b8f43c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b24db9055331f5981128c5fdc3ec209
SHA1df09b5647902cdc80f038407d595e25157c65cb2
SHA256e9ec19aabb27807453d0af8cc0f78acbe45e0a28f62d341d8f1e64ca76784c07
SHA51224f6143e72373bb2a9e9ed6fbee4f9520c19537ffc92c5003ae1ed3a44a15ef510422505f5f7797c9cbb54c697c82f65974ef784d7867edc44e84ab4f330a12a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a3dfb965775e450568d04cf89090b15
SHA1976dd58e4618655a693fe9d0cf6cf5990e31c82a
SHA2569014266169bf27cdc74b9e8bda57dbb42729605dc6a2def29b83d89babd876a3
SHA51209f581bb932b41259bd3313b206aa6087d35cef3e6ec0147b2d459d05fb86b84b07e9d7e465d1a8f49e0a05310c8815919fc96e17e4129b6d7a18c4c1ffa146c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce6e6b9c54db2cda74b768f880aca91a
SHA1d6df81c52585ee2d0a98273da79b274550fc074c
SHA25653ef29e27dfde2acfd82dc9ad26ddad6fd2f3335ed9c7737d8dbaa8eb3f3727c
SHA512ad4994a6f7813da41b1238c72227a889994efd584bc10f976e9f8f5e4a1d11b1e648b33074e95c0de83a21ddd9d034808ec0ff8a46c566d3277d010007079da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4f1ccfec927520d0738c61ffcbc6e96
SHA10294460d7d02728c8f2620d598bc5714f09a4936
SHA2564cc0a93911239b492534e951fa23bfbacd59242828ac502296f8854c1527582b
SHA51252683068dcad207dea7224205f4b4a981590e9743d8fb55d28a7f01119356df063491a18a61ea7809256a3dcd75f5c8e07e9c64046d24d0ec66485de854ca3af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526b712cd9ce00859f042d206269afa42
SHA1383bfaeadaeaec440e49c4de13c35fa40a116e91
SHA256b065b13210ae0cf31fa8783f3eb6319fcb1205ca715c93c6985817c97adea61a
SHA512451b703bf44ed1565554d41f563b5464718ac0cc1d9441165fb9e01f48584766d292efa1782ab1e7225a4c97cdf1bb4ee16d622f30d8cf1a2e65a5ba129a9aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536fda6781a7941896c56ef7011712ef1
SHA1bd8bf4c5c530396d34082dfbf9a723ebfa5aab46
SHA25660ca6410192f107d4499b8edc98de31ebad695153131856ef60709f1dd26eb57
SHA5120a9dbd86ed6da61535bcab8a8b60a376fa7aacd46f8bab4928b27ed1dcf58400cdd08ed99f8055d690f75de0f4c3c3371e3634a8cc8f01cc7edae0948ffd78e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5897e43f187b65132cbba39b848138ba4
SHA104bc7babe377148b04decb4a19c72ba6d163113f
SHA256c3bdc3d7c30abda7a6f5049cd62b5525e4c661a3de56c4c257eab2c462ec362e
SHA512663c8b63c859d415121f33b01c6ba2c580885171265548ad21ca064095189add01f863be7d59c593b8d8ef9993f0bc2915a88457ffe63821b47fb56f74c8f753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b513b51124abd496a349eebcdb17f6
SHA1d71d6eb2bc232c1288e7c24988009182ad1c3d16
SHA2561369aba348137a705d53dc52386dcbb00d580d8a8147612bc638eb50eff2e36b
SHA5126140983bd599d236c153850dac117201e6438d75d23baffc295135ef3917d6f634f94bd8dad96c049e94104198438b062b2f19b0c771fc02b4acbb5ad8929e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52177c931e0c195f6c252de54e937eeb6
SHA1a52b99c511672d189c1aa4c47a8afda28fbb3746
SHA256ba0ed203f8cd77898d4b9d0421187cfcc1713f061f9dd8040545e0734480b648
SHA51213b7cebc96ee2b29cee8edf0c5603857245971fef9c5d834133f7901a977717fab8385e8e2448ca7dbe56e515afff7d2b9811653291c05dda450ba5caa62b350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513ef1e59acdceca76823c629748627fb
SHA1cbe411e807694a358b039888ba5c0520a38fd28c
SHA256637bc7d848551c63a171fe5c3a93cc1725e4ce6fe7845b6b8a2505880329f319
SHA512ef2826a662dc6af6c9ad3aa751a76ffd4f7c3a584e21a119ba6d2fecdaa273b63d0d27e7b318c1ce113689729a77d99c8c3189ca5e68461205035bb6b105404a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b