Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
082bc2d84c42d0d4724a67f15d21548f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
082bc2d84c42d0d4724a67f15d21548f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
082bc2d84c42d0d4724a67f15d21548f_JaffaCakes118.html
-
Size
139KB
-
MD5
082bc2d84c42d0d4724a67f15d21548f
-
SHA1
6f9e98c6df303fcd2406afbe91539e3a190147ac
-
SHA256
2d48183817ff4bbdad60d495d570baaea657e6ecc6dcb84b13169e3df9fcfee0
-
SHA512
e846aeee9465f9ea225fd8214365d6e1af8434ab9fdae5e6b1de16b2e072d796384b6076eb09dad9c976620c6cd487e3b3886f2387d318baf055aba2e367c7c3
-
SSDEEP
1536:SUz1Y2slZ/6yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:SU26yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000faebd3f610423dc7e37bb9ee712e50ef4dc38f3c24bdcded45e6adc5fb09183e000000000e8000000002000020000000eb648c71ee0ab88c52d3172093fe27d4bfd4571de94e1b4ad8b52be585cac65a20000000dffe20f9d0db458ef92ab407657a2cbaae8ff91f309208ebf1ea45fb9f006bca40000000ffeb2fe9593e5812c46f63d4bfb204ac2e7ecc60c7ea865d29b1921e3011d9745a01b18a61f7b3d62142b9c909b8b4154cb2c886eb72e377bce0439d56f1b471 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433992822" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d080bb186714db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{02BD2951-805A-11EF-ACDF-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2752 2440 iexplore.exe 30 PID 2440 wrote to memory of 2752 2440 iexplore.exe 30 PID 2440 wrote to memory of 2752 2440 iexplore.exe 30 PID 2440 wrote to memory of 2752 2440 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\082bc2d84c42d0d4724a67f15d21548f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c18773c2debb85fb1e1ede2d0cee228
SHA14c05632305b42cea5e8a7a322961f6197ce17900
SHA256b5467b05da05926f36006cd8be46963b5924b2e224ab465c94984025fd98fd00
SHA512081db96c09b8bfee3cc868748e7a2b53b2f195aca7ff320d6f238d4015b8b871e4f1e50ea68e8384cf5f434be2fb3a7edb248239ab70015e4c162c255863fddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dd5e0b299826a40ed275048db3bf67f
SHA11fff22e0db42346ca8e283b92c5020f4f0d67499
SHA256a1177c7f91826208c616549e46cd84121b1c2988cc539fec8b3f1d55466e4383
SHA51219ff77cc46c1d14a663caf9cd6522d98eb9c1555a1674d92102cc8936e431553f867442c9dd0baee59d92de1d0c9e52a4a6e5f7b996a7a74147e98698aa09262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3d2d71d174a147faa639e00a1741ee9
SHA137be4989b0f6f4d62d444ee134aa1775e1afd341
SHA256307c27bf021ae90f48b51dd2a3efb63c7d2b81c7522dcfeb63abe73de9086ca7
SHA512809419d4ac7c2f7a371c524084561a0c6ff57dde399fc61787faecd1495b7607125c3d92679d1b2a4e6573415cc1712e4cb17287ed9cdf25a35f0ff6645b6211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f01af6592c7b79f023fc8b705b601b6d
SHA12e32452d047f2f4b2e4ba6293346e0074b056955
SHA25601670276f599d77d1555fa362be07e82557a597e861efd5cb4f67cb3c4511b12
SHA5122d52059d29eda70a644866bf10100472627503ffb75fb95292fb73e0fd0cb048c0651c88e8bfb41224844ad31fa9311625002ba86f98db4c9cb8f44127eca137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5269f304224fa89beca39ff8b6aecf873
SHA1f2b1c9b2df96786adf7e73472e50f44a29d6a066
SHA25688514109516016115b9bbbb921225dec6ff8d01c39c86f8057914affb8aca7c5
SHA5129dabe31d6e5e7f1aa0322d48ff3d934654c73ed018464cdd0ef9b19a550f9f7139a3d0b7319f03650ebb336b897bb523a5c8866dd920fd313ef101153e454863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aa21d25f0b3673e33ec71b18c6d2a57
SHA1b3876c10b15c875318a6e361649411871a4c1372
SHA256d9a0a80a4f27c73e97964c268e564ffef887c850bc4cfa8ece17fbdf4b516ab2
SHA512d8df663a09d6c3ac50dc0027590a821a4447b0fdd3a0fd6441a7678d9f2237f9a131e9d1a5fb86bb58df9a3a7a3e48bdfbe2ca387af379acfdd5b66396866545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2da580b5d717b61fe395112604cf8bb
SHA155faf4c9940b5f12459d5cce9874fda1dfc7ece5
SHA2567612a3e9c716a10c917da7e3978bc3e572b84e3129223e00ba116fb15b3d56a7
SHA512a69a320d96ef06e9ddb321a736259e3b64c8d862ceb1b41baa678b3cf25df965753e7cfafbea2afcea31ce173b912299271c5b76f0115df683539cd9ca474fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8b39b104f0d9beb7200f00984460060
SHA1e191b60a8dafbd40c9d73652bfa78424fbc19353
SHA256e10ef43905a3fbf08c683c417321e243f35dcc90c83899ff179e56430492110e
SHA5127fd81082729f284f31c5c48a8f01ca4adeada18e7e12fa651529a4a57628688875a4d6b75b0b6c43e69d1a45743169e8074649de8818f3699c5d15e0fcf48a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc71697254340483270ff7d07803c087
SHA1b6374a1e68aae5205a2d14a098aeb45aef39f8fe
SHA256fe86e5e09671b67a66aa729261662076949bff4751164e26584a35bd3ffd00b8
SHA512c4f08f0de66f43d741988ebdd92a9c209374c9eb3ceca5888f2e7ec5d5c87f6d7b687eeef0189018c401c3fc5ff29fe0b43b14d616a63804a8cd3d612e83670e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d162a0583952135edcadb51e5bbdcfa5
SHA1dad3e9714d924149c53a8f6d99a7d81ff3c216de
SHA256ae53eb8010998b8e4871ac899efee696c49300371d060a3c1a75ac4e4b81ad03
SHA5128635a4267b836af5f049a1322770c1ee6cf1709528f9e3d3378b52a5f9383b81fcf5348bfe89216b78ba09038b10dd2d216f148b60bae8c5383de318d130865c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566fd807c96da0ed31b2c1b0684943328
SHA15b05673e34ff33ffd5027059641311c803ef1510
SHA256ca2cd2420b63629aec29dec6a40c104750a8195535f8a2aed7fac96727b8f809
SHA512eb963b77cd84489c171d187bbb1d51755571dd2c106b43eb716fcdd7da44b462864d9e33330dafec4099f03c95c76a11bfb608fe26b954fe39bcb897cd4b8bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509bc0114ede760fb24e29a9f725d5995
SHA1e357013a22c280bfecfee0803b948f6036344fe6
SHA256036c9fd79d58a95e9f42ff7a5c492e69dbbb5ac88c526e118c1e4553fed4add9
SHA512d3c905918e5c9c2da41aa2e75291c074bb5889c15bd020b48271f49aa35556c483638370cea0caee8c18f704430dcc96f92eb1273e3cb659fa88f93b4aa3f161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59247bb37d5b45979b7da83159c844cbf
SHA12b1a5e93364b4d7ac59e761865acfdbfed3c4800
SHA2563b0ac21baf58ebb6b2d59ac2fc42a6cd7a24604eefb588efd6906d0d0f0f4a1d
SHA5129b323f836c23a803809df867de1385d72f45ae848617258efb1510964e9e77f10f3b279477a35b822569e61c45faf1ed5b4035208080fa15a14c7d27935ce633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a942d02c0c4a49bcac3347ec23e0ad29
SHA1ed686da0d7b1af2e7d2068834651c3d3623114b0
SHA2564857b8fd73f4026cb326bea5a3ada19eb7aeb7adcb347284d5d949cbd35a141c
SHA512a62697e2428fc875537a1889f8e0295c2d0e010ae240e3efee44f90f3518314f614f33d28d756f3833ded4e3cf81505564040e04a1210122b9d1e1c424a681ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52645246898b07542252c698c5153aa8f
SHA1c584123ec62199af70ef65fe4ed6a0b282229036
SHA2569ad7d2f6272ca7bfbba39e8dde0716e70d6f52caeff19c03b372a7375096e1d7
SHA512dec5cddd04860faff14e345bf2c6de958242767bc12d01a34c4664560d16c4e37f3ff9364efdde899c65c1de5eb7235e64de6e10900f6e8130383603728fafc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aecad5dc914ed58fa673535cc11dd0c
SHA1619f5715ba007938bba7db073d5ee0c47c3d0956
SHA25607e45c68de8bf61a8a731fa85a249151f890339432415031fb7dd35638bcdc25
SHA5122684e93e6caf065a9e543d7a32aa1abeac2dc330e70f62b6049f59beaebbebb5d4233db383be68300251b2bc120b499aff2f362b04609d3c5a0fa762eb20cbd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5831b0d6d23e8d7f402d0ec847ca03e7a
SHA1a7a41229130d8c26c15d08777774f2f67a51248d
SHA256f64e5de9825e314377abf72798a4fffacfc84e5f9e7753be1eab61a70a8406a6
SHA512d0f9153bbfaa38c32b6a155918870f402ca989ae910de04cea4c0fb11dacfdc47044d739bee0d2745f21010c9e43ab8484f2cec6bf6a173591b51af1756985d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e93180a4c4c96889991513c7198209b4
SHA11305ee9a610da5720ed4378db31c4b3f927b8d2c
SHA256217e76d1f671622b8611f78eae379e69bda20c917247d4e6ca80452d5c1bc1b6
SHA512e63a0ab076f1f6b10cf115af1fa948807a44be8c035c1e00990ec96c44193b3c35d339ab31557adf8c91cf47c2d9e95394255d219a30fb31793e41e69e51a9e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570cd2e0634fe676450fc91b6880b8c54
SHA1eff2193434602bf8e9a465d71d8e27dc65ac2665
SHA25698849c1b90971af04af5a536ea308d07fa8108e3e4fd8615bb9b3ec5f717d2c5
SHA5126e2ee12b0d138e3dc5785388ee309a07f2a2da2470ffdf7bc15560b7c85238c37b578b2bd4f0d623073cb634fc0acbbef8c88670e794469a8fce71cdff2b9232
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b