Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
fb04cd846ebad2036365d4bb428bcb55_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb04cd846ebad2036365d4bb428bcb55_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb04cd846ebad2036365d4bb428bcb55_JaffaCakes118.html
-
Size
3KB
-
MD5
fb04cd846ebad2036365d4bb428bcb55
-
SHA1
ad0a226f3049507709265e85b6b24f95d888a7d9
-
SHA256
3f71986dd22f1b5d4196663008bccf881a775169cbc80e394f3bb45d27abf0d8
-
SHA512
d512df95c6545f3500636c2dfa090c80f7b7d85417dbbc201f5a4574beabd4ed739f21c3bd553593b7deacd469f00d822f4fe675a43b1dfc5ca3dd1d00916d22
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433638054" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000fcf3c7a2966d470c95af0d598479271aec8eaeae4ef8034793dc5eac2b71d27c000000000e8000000002000020000000aa132ec53f011be4004ee714d364c11f7c16eec6ca4a9824fb0c45fba556ab2b20000000ecb1f7ecf8b26d0778f0c98ac961349eda43776062126bf458feb32ecbc86d4540000000c913b9600a0a91cc9400e2324df4e3c9878357f39367547127ec0ccde4eb92257df31ef16b85c364f9ec2d5c143476412c33f55aca71e25e03b565aef1fea7a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{008EF8D1-7D20-11EF-8F2E-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0693ad52c11db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2656 iexplore.exe 2656 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2948 2656 iexplore.exe 30 PID 2656 wrote to memory of 2948 2656 iexplore.exe 30 PID 2656 wrote to memory of 2948 2656 iexplore.exe 30 PID 2656 wrote to memory of 2948 2656 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb04cd846ebad2036365d4bb428bcb55_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585ed0dac47e3d0f28d86a3246f37de36
SHA13a3f8a48563ce64ff90e123822491cc6df0af37e
SHA256b0a5b79fa12d1391f447d829cabec3a9dc1af89899b74041edfa651f4a3f716c
SHA512f1daf5363a240bc250aacd57225d89a91b127c580297caf5cb8679c04c6972b1845de45d4ce3e2eea51dfdd5bd4ecec19452ceaf987c4e3c03620540c2dc718b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504f50bad81357e2b5c192b94cdff79c7
SHA19c52b5efee4afdc23f4186a66348009ddbcc8134
SHA256ac5f298a343de9909b0fa34febe70c86333952f11a86c810054ef0850f0cd5e7
SHA512f711157a9cef4306dee9ed6856ec1d4ca39500647696423241524f225e790bb6a5b4dcfd6c7603d933c7029992de2273bb1c2f66c14b7ec7d6c28b311ffdc9bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea736969cba2cb81f7783f11e7f3380c
SHA1e29d042496a7c68a0b21b22b63c60b7102669538
SHA256ccc34b2eb815080686c52ddf8b1a985d4c99fef564c551908a005dda9c973b6e
SHA5122196007ab4560236a075e5f78e7c57ff732e1184afbad4dd39ec5c5c0bc4926ff33fe849f6d4b7c3ed367b55e54b36a52eddbdef082261216b7a7dfd9188aa53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a92ee8a13909eead771520203c888d26
SHA167a74f56ab0326d17fd3b247387dcb99c8643c36
SHA256dbec22f2e163e4d9a86c70ec2545e46b526beb9b5a708705e30e9b97be15f6aa
SHA5120f25c293d4751421b17cf6adbcfbeb4f858282cc7a2f552ad86b045899d5706abe65315513f31dec3d00fe2ff2b6873bf5925fcb975e28bbeed4b98a4b4163d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553361dd902e88a6a1c79054bc9467320
SHA13afb6a890102c7b13b42793d1983aeed91797ea4
SHA256a4745874b53f577cca6bcfbef9483dcb97a93883ccd687b0030a3a2280de5501
SHA512c29cc07e19db9d1521267e2cfce3ba4562d6fc71aac262aa0c22663276b8626fd08b3f1b2b7ec8247e5bf5a2a99dc3d224b3c390f1a289651b48471f5f17bec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5933b3226efc0047455f49005d67d34cd
SHA1eea72ad292b305321021409a13fe82c18cc9f75e
SHA2568a89d9371da15b64685695bd3836c8c63dbd6d420ede697134b9f1fff985b731
SHA512053f1cff0588f1a20523d881be457c4af36d766faa374d09a71f230bcd7210a81a9cf03e364e7cd45786016a3f5790baa7d37544eca59586f8d4d70197405496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5315bbc178813256376d9cd94fe5c3f89
SHA161c2e24845f40766f1697bff0557740a8645197a
SHA256da81b3a39639942bb4ba7d4802f724627a0fcab76b20319e7ec449f32f6a648a
SHA51239a2ac9433eb775331b7f9ce030a25aaefa01b32d22e44299d7300a9e342129d68bcfb7c9b864b7bdc25f992d29879ac206b8deaaf49188e1fd9cd0291c50bbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b07c3fce78e945048eeb29b9646897b6
SHA17f6022ce45db415f062e4db811011702421e7795
SHA256cc5d6b1c44b45ac5fa009ca306ab21e1738b29fdc81847fb480fac8052decdfb
SHA512c784694f3e84c00d7176dbddcf271449e7548d7592520cef645407c1a191379db17c4a92e7fff4beebb9e6b4602eb78dc064eeda902969bd84d3cc2206142776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd9c3f011c93a013558f150406b36b3f
SHA1ef6264a960e103d84086482d23bf367a299f1057
SHA2560c52157c2773deca31764ce4bad519e3c2055b15fb8c4a41557f7f4c0f8d4135
SHA5126f8eab67b72cec330243f6cf65f200a9329ed2e03992b74a0c4b7a465d2ce6f22f25b4919394d9066103bf39515ededb7845a9482835d435ae4b786cdccdbea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554783c10b581c0b04c4d222843303ee8
SHA13dbdb760d353b1283e2654c8f7f2022dd9236bb0
SHA256971708a828e4259396ed2965863a5bfb3cc6bd22098c986627d478a94c6618aa
SHA5122706acf3d989d15024f6758136f9498d91ee363561a53b9a7791bff1b1a481eaa86808e5ee4db4685757558e321ced30c6e6e285a46057bfae9f2de0410598ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1862d755f20e9efdf7d9a042534b201
SHA1ace46e67162d45ec1bb8e1996fc76025f640d89e
SHA2566779f4e650215df06dceec2abda11c4fe18e86b560c78f8a8b7ce3192401b543
SHA512501e5f4e4f23f14bfb693dcff6270f9bf3c0df9a4562e97836e6f786f823bfeb669ab1cbb7c15149b32117b5c7384326631095bb44c217691c2495c54abd9453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575be77527503d9ae01cb1b73d365915e
SHA1d2b72ea3419b5412244e21fe8b6ff9e8a53119cd
SHA2561d33dd9ba79fea931c77d3ef2dba8b7788bc4930d2ada7b842b8b475624ad5ac
SHA512d10e74c360f20c3897a22c06b8ba58c98f0aed1ffbe3a89ffb5f10c7a30d5566e0fa6c59e769e828ede34b750562640b47649cd3e83ae54d03b4c2d3f640f9a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6958e8cef1869e947eb5fd3c5969582
SHA1d781814eb141d92b77b91548f12bab20ed81da8a
SHA25658b8ccd9a2cb877de89b69c91e224d6bedda35cadf7f9c7b39d9c36a420356af
SHA512f08808f881122f648138d41d8664d09924b06d67b8ce6a89b92e73ccf3ebc373ee27f73fda59d50ff0772fdfca21bbb2641602e52131f39e4ced7f12964bc818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dbb191a77e163b560f212036f7c92b9
SHA141b1d4698c3bf0497f7fad2251d58f91611b7f9a
SHA256e2a37523198d51f258704c59551e351098190ecac632358b4ab280fff2d0d7d4
SHA512eda4968315f75be2956a38d0b136fb2eb19d2ea54bc3bae4b16567919ddc6799c2f28ef2846c1e632795692cafff0e5b838abf418779b2bc042d43a1c64755e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5751b9018bee05836e16a5bf0c24d5c14
SHA1bb2a50ed36ea6fbce33f6400806e0011acc74358
SHA2565526729d1e30d3ae4abfa6dd24a977e34e9ffa2384d35b02219531f54fca8489
SHA512e5e6f08bce9d75faa122e5775048b8165c3a149e9d786da8332805bcf825dad81ba348cbffd585e10f8c02ecaa01ff67ca2d1e522005c0d3d090ae0ffd2234dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb631cbcdbbcbd25b2f4dec41513526b
SHA150569f4d874583c051ea39020c8500b4aeccd746
SHA25645de5b58acba06dc5102fdaa476cfa17653b0ed43e45df50aec18d838784fdcc
SHA512601a90a2b60fba94d98023c669b027d71becb23de11734f38933d462b9cf25b275a34dfcad373f783755099093b0fabba07177b76707723b116f292e81d50e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52534878dc48d2871aeaf07b3251c0ad8
SHA130b1a1ebb45ad3dc38ebfd156d6b62f5b4e0e4cd
SHA256348562435919a99b8b679c32231682c7b8a6df73fa467bf02981018f6231e7f2
SHA51262f6a07c96f677387e0d2ebbaa2684a2ee600ef65b163ffbc080932575c95e458302a5bba21bdfcaba141a55705e28f707d2004bdaa20c72b31cad7a331bf853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531efb21e12ce5b5545420b97daac4553
SHA1a7adf5e1e69c231d1bfe09e0a66bfb6daeea98c4
SHA256b32b06c4c45dbd8eb4df10dc98b4f0d997bf6fc4ed63b64461f178653604c4ef
SHA512a6e9bede8b6b662b5986cb59c380ee91a7612b49bf39c22180e9dce9e7dac8a61438f90a2cf31bb04799b126f4cd7fb95992ff57e8cfa96eb09e943732c89abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536a41ec423de5d560a97b5b6c03697d8
SHA1c00f6302e9885db40696682711fe6c7dfc22910c
SHA256b4c271dd90a1dff76fcdf59b33c7e8a75b3b1080ae3128194fac216563816e8b
SHA5120948b685e79a0df78d67fa3ecfe85f14e9f506c681bab30cf7edf9d37d40195ec2c6dfe993224eaea16cc3e1364309cc410b20ff9efd56821caeb60e2979397c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5ff4ea63f0d912aee03c141437b7e0f
SHA19f325c543f477a282dbf753629dc17ad54a5f599
SHA2568a544f42a89f83491e6211529f28f5afce43b0c9f53c4d88910f018f72b7f62f
SHA51206c6eb6f6717acb2ebd88f5bef69f93bb9ea0844e7af224518cabd4aeb397ac0d66043d387145970fe419c46b2e1f1c5af419adcd1c1220c94f4ba71b866f5de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577258188b00df4d587aff227294e5ec6
SHA1d138ada094aa01639ed212d5f5466084720c473e
SHA25682a8ecae95282d397ca2d4d8c10367c331565f2a052a0fbe70308d00f4da6e55
SHA512411c8eae655846a43867e751e4bdefbf4f1dc2a072c067d9537d6d6ea6f2ea804e60c7d2c467fbed2e610c3afbc230e097ebde9b642500dd17dd43d2ad1c9ed3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b