Analysis
-
max time kernel
69s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 20:09
Static task
static1
Behavioral task
behavioral1
Sample
03159e22b2f8102b90ecd353d1dc4008_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03159e22b2f8102b90ecd353d1dc4008_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
03159e22b2f8102b90ecd353d1dc4008_JaffaCakes118.html
-
Size
6KB
-
MD5
03159e22b2f8102b90ecd353d1dc4008
-
SHA1
ac3f6e551bec1d67a7ed28ba72100c7aa586cf6c
-
SHA256
b21ecdb89d96e0c2c8d47df7ae792580b36dc8ec2a6c373fb65d387c9528730c
-
SHA512
00e0622b243f7c432be26f5ac5c0bd640012fdee4f9cbcf1abfc902f6957df7c09f57b870e3969b93a5d9ba7d9ae5b5122beb55e89ac2d7a7d0e9a81b9c74035
-
SSDEEP
96:uzVs+ux7pELLY1k9o84d12ef7CSTU3OcEZ7ru7f:csz7pEAYS/Vb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433888815" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000a3ee3add0a9e486c1d29089f19f65d9bc8f878036e6b20f8e74bcd73a0c7d594000000000e8000000002000020000000862310a07091ef6dc39cff4c234d35eb8fc42d55c3cd5a24771ffae1ddb3af2c2000000045ecb2864ad5333da61d4d10745f394e55534bf4e42c425b03027618bd2d6c694000000020e146946649bda9bda19890f2aa56a4fc106355484ee5ea8a1fab0a6057ae6c6a48c13f204cae2113a7542fdb118cfce56f90abef2a22e00c1c0ba79525ba3b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e500ae7413db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D8632D01-7F67-11EF-AD26-C60424AAF5E1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000b3641fca746fd2661bafaec02d842a78d7ad39deccb7e9b9bd5b8419b548317d000000000e800000000200002000000063febd58b6bfca2ac3ef47f9a71f757e9b529ae08da9854a3eeff4f4cd4a771e9000000025e22f57cf3b3cbd5edd99c1c1c76d1331a46c745bd6445e6b01b2ac9b21092e0dfffea3bfbd4535a216b275bcf5858db8a2060385d29df0b5f0ddc47664a65f13b15caa460947a525b7f023e55c18f420ffc2adb847055c4c7372b84643b712ea781da5ba28ed3d0bbb08d3d728158a1e4f0ec684adaebd8a28693a66814f34a0d6f901e241d301f524f27eda9ed46d40000000297fdac0befdf7abeb6749eebba7774fd26cb5ade0da6515a1e0b1f7842b37de105f4073550e0942f45a385eca64d1d8cebf58eb12be69f4c46d734b3953f0f2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1288 iexplore.exe 1288 iexplore.exe 1220 IEXPLORE.EXE 1220 IEXPLORE.EXE 1220 IEXPLORE.EXE 1220 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1288 wrote to memory of 1220 1288 iexplore.exe 29 PID 1288 wrote to memory of 1220 1288 iexplore.exe 29 PID 1288 wrote to memory of 1220 1288 iexplore.exe 29 PID 1288 wrote to memory of 1220 1288 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03159e22b2f8102b90ecd353d1dc4008_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb3a1b3bf7a0299b8d1eb604dc82acbf
SHA16b0623ae8150dbf25ee44816c874a8d912db1b6f
SHA256087b8f767370328a73ba3dbf9477b1b37cf70ebf550495b7cbc27136754aefab
SHA512710c3b08627e61d4db3576fcb66bff5fb9cd8f15fae372cbe0993e387d4a3b72381b5a449e7adec9f7838b74594a84b634093a030af55fa487121adcd84b9c82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd2f430983659ff0f76d1c72def00751
SHA1bf7b814c83270d26555a4992803f6c3e5c76aa2c
SHA2561804483f3f9314bc52d85a633624f8f18dac42d2a627f5dafca5da5021e0995e
SHA51281a4f735e4d201ffe1ed7273abaff189531f630aa9529bc1e90330bf3b5bd9fd53c3e5a6ba9f0219ba4682e0518da5ee58286ed16887eb4da40a7f29fc4cdf02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbfa7321b4552fb0422964d843caf667
SHA14898097d3a65128ef0fce31c2b2070dd9ba6a631
SHA2563a4ee76d8db45cefd8fb2fa5402be5665b8731a07bd8aad566faaea319b267dd
SHA5127bdbf3d0855a5615855e962bd2d3464c98fd2b2a791232b9bc34ebbc587f2f1473aa0d6b00874eedb97fbe8121cc2e3fdd6f171ed8170dfc1444228dec7da553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f4a15402ec954c9c7ffd216e364073
SHA193b5223dd5fc403ba40ae487fae48cd31f16524e
SHA256327f9dde47b6e17e517ddbfcac63671a3258e868be0f128bbd625ba612807029
SHA512d327591db536e787a85fccc32f9fd845afbc70681f9d5ef0584cb3363a4870748b1b330990c31ed6fcc0be5652f77449d588d930817c3f71bcd7a22a46501b31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d445efcc346a7527a1f8a4f3f9e962d9
SHA1b14522a23160d453daf3483f9d701ef5deca38fe
SHA256c92896753e26a23fd1a7931920bca39f40f577718e3e96700ac3f5c71fa29ce1
SHA51216055fb0b79a2c31a74f44e8b934fddb3351fc4072bd27a4bc6f9d66745521ad60db1e8a18136964bcbd8e03b4f0b105a388d32b8e640f92d78f6c6749e01d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e378896d48ef0da9463dc5e98d880337
SHA143faae530d17605f39b6fee94ebefe24e511c94f
SHA256c352de193b5c478293b7c6b3d51a28f4c0830388e03f1aa7871cfe4f032a995d
SHA512b9bba75c448b263428db1299f4b8a2e5b99d037733690fe6fead104e6e62b849490a8558e3be2cce8b6b10a6872edaab819f01d417aeb0579a7b09e010afee4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3dd4a157563e34c95df35765816763b
SHA1e71b1af820f5e9f031809afff1bb85be5e76bac1
SHA256f89a1f749ba2f5db3006c2e868e1ae1f826cd8938a02d0c0a784aadf578692dc
SHA512652be69697159ca0d480b2f970ca03f23413a1f2f310e2c34a1827305e04dd51d48a826daf872b1479d17e87516c1ed40cd0465e8675062a5db5e28c01a24a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d1104a679917ca34d384cbc756157c1
SHA1ce5766d5979f4e46da8b9a0c4dd0daccab550fc1
SHA256ab8a9a10b1d2d5364280d0f2603c7d7788b5b6b0060d8dd27f1b9d4bffadf551
SHA512e2ce4a93941933072dca5a3b05790e0ea8bc54a3f1b565c3c603cf3d620b46ea35fad2ee90408f6a8945d8876673336eec8e7ad649fbb23141b9ca7a047e13ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcd91ccf98ea7bf5a46536d2ee482f1a
SHA139b653e65eba2327ac37481f03b8c2909ab4f46f
SHA25681f397c2898b38a8513f43c961803f678e93c3c641693cf0c731f63819b02b6d
SHA512cebfbecdd034d730b8aa829c55d56994c5f35d56b26e9bb54e9cb3099c843cef25f00c71370b7163ecdb772d8b54fb15860169af6d317b5b04da9a817ab71354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3cb40cb6eb27b8d85bd30459b210957
SHA117b67df79041388c2b69b6ed887edcb98ef6fad2
SHA256c3a6287fda2323b60bcc685b39506422bb1b0e67024cca18f16d114eedace34a
SHA512db9498c33639e9a9ebf737592e9d09414d650ab879a8854c95d08913683452604b4af2966b231bf1434ef6f701ac03ba88555f5441ee7b2ed28772ad0609df1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9d2ceaf2b5a689b4aa52d2f28f84982
SHA1dc08009abfd25c0a932561a6f9f8874981a74686
SHA25604dcd792f8b556397619c24941a6e29377b5fb338b4197498abb7c0c87909853
SHA5121083070fc23e797e63bd30886eba00012d91d488d4a0455bdc006f54dccdf30a0683d85af72469f23f3c6c14b1c2ce7b3bf9614e93dc8577f90fafdc81f6ea52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d849f7d89482e26511606d12607861fd
SHA1794d6ed950dc39d2f26286b8e166eb32a3218ebc
SHA256cb3325076d863bd9803e8d49c9a17b995199dfc5b8127029e7b4dc40f1fffd47
SHA512bceb608d70be6fad40775b29a4730ec59c25ad1cfa5c338e275624c2761e232f2ee1343989d6babd9ddbe499ff0eb610bb066b10c8dfcda5539bd0845c17ced2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e94a7f18ad2505b5d96ed396a6444c4f
SHA1ecb4917d459aaad4aaa9154b6e59bec94c459a02
SHA2562a6e631f8a518ed4a61d6aacf83b8f9e98537a5cff4e07cec36f2fe7780a43e6
SHA512d85165896c096dd3319ce28d3ae84b914ac94c541bb5cd5085960414a53b125ed7e748de55d8349fa53f332de5096b51a428f0722d90cb0b899b304a425f01f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585cc73c3e85716509ccf488add7066cd
SHA1e19dd156157a7f9fa7e453e3267e09ac052161d0
SHA256811be48359b888df5a54c0ce01b8a7aeac7d5d84af8e484622c76eaacbacc796
SHA5120f6523e08617e4aa4df69c4f3b1e7d32e38a9e1578fecd4b5011c130b89f0133955c1bdde8d4d914f7b146ec82a70a0efc0b11e5582401d4259682bf0a162269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571d9c3e80b8e1de571c769a78e776f40
SHA1191067f91cf1c74bdf525d38265ddcdfc7deff8b
SHA256b481f61d2847bd06039ac6f8f217e057afe458aea2e1db077bc3b068f995e5de
SHA5121bc53c7ba6814100d2572255ad491a52cb00ba91c46e564061c29ba76bc6cc004806f932a3eedaacb3c73fcc04d3b2d06f4d28ddc7546375899c901f17cbb732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5142cae6ff24ca52bf6d6012ac2fd53fb
SHA13928fdfbe1e4b7c274ed39c988779fd09d02820a
SHA2561278e65697947dfb6ddcc581a4a99133477173b6c4dd0bfdd51ec9a104aa48a8
SHA512d23e20b4a2f9ab1486b93319beb1375de1230c8efa88136f6f5370de54f5d376d26dd83031713797a153d0453bafdee9fdfa322e167362d9e66a85f49e3e198f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b880df9727b34f246009bfe193b24013
SHA14d1811bafcd5fc3b4243e9ca4cd3a4ea904df4f7
SHA256fbf1f747c37404ddd075cd25a80f2cea17f53d59800a5efc4820ad37c902643e
SHA5129639b8c1e877fb4908649c2e9c665299860e52937df39b8afffd6b0b4458e8976a1635339eda078736942ed96577daecab2e1f3ca67fc90f567dcfc1eb3e550c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554a4fe4c4d938e0a1c7d80fa2a4bb8b6
SHA1239cd012159dd13c69e1efaf4198c78856d71d1c
SHA2560f85ab153596f52448f02135ea442c6d4857daf9129c5297d7165d2a87ae5e41
SHA5121199311f39d1dd14f46c787eb1dad169622426d74c05bb5cb405f766fc013eb7271ed21ec852b9abbb4bd9a0687b8f46467d6b0dd0ef0148d1b846334d6b4d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c7739dd07e99a25f14764d9a55e67a0
SHA1794c61d0a8e14ac0eed5716dc58d2b630f554f41
SHA2568e3173a86ef45a7b574fed1504e3b82cceff7b61699da9bea4704fe126976286
SHA512bff0d7cb7d2c90f2bcf2ae7ee62fd337bf8a38bdd06f5c86985cab15ee1a9cd055a3e2fd228931f3e07fcd1e7b9c7d8ad1400d8f05bb9c088e8e908420b3b66e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b