Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 05:36
Static task
static1
Behavioral task
behavioral1
Sample
2bcf8d5720145436742bc43a566b0c24_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2bcf8d5720145436742bc43a566b0c24_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2bcf8d5720145436742bc43a566b0c24_JaffaCakes118.html
-
Size
23KB
-
MD5
2bcf8d5720145436742bc43a566b0c24
-
SHA1
19a37d390be6949a5a9b71d6017f7c319fcf5142
-
SHA256
04cab5433b0bff3358d7685aa2198ad390419da36244601309d453f3bf083620
-
SHA512
f6dd6791fda29a6702f5a76e5cf5d1e25197fc06f08aa797c08892be4396847c2c37f568d9fb3cb7517cee040f6da9118f0ba7201ed49bfa58ce0bcf74198775
-
SSDEEP
384:JnA4ywc26pFlrTztvukeKXXTuawBva7V0KL24UTpNyOcn8tvG5nTDuU5esT8a:B1u2StWkekByiSKc7wV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434651246" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008edb3b59c7d795479cbde6c057acec6f0000000002000000000010660000000100002000000071064d8134d89f0e11491217ea187f126435188626b6a01d8cab3abaa7ea5298000000000e800000000200002000000029e9202f65ea7446225b9e0142851bc4b5c5f77345ef13e42b2379a5df6c74dc2000000050e1134fc52838ec7e8c7e09c57e4a4b27fce1509849d1add73cd9b04cd3cc7540000000d432beaaffcce551d7ffcd9d2f8b13d36a80c6ef64f08fea30b502ed44a32b676e326cb107fa4fd59b7f6bdbc80936003fd32f161afbd91bf6d5645d09c7fd4a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008edb3b59c7d795479cbde6c057acec6f00000000020000000000106600000001000020000000eb4da372b68e84d659b2453c2167ed8fdfaf6766e2881dc3bbb9c0bd609b8528000000000e800000000200002000000079833adb7343267c1ecc843c6321358d963d8a9d3b3a5c3c2a24ff983c1b314490000000751631309e507e1b468bf321ad46cd1e37e4a9eb7f1b3bfdf616c1407d5a9ba3c3899229a24272adb4588739bc3c8b1a800275c5af68a059700a39fd78996184f70480d2efc1570ad2545d180e786d3b5af9a0e64d3845ae411ae2eff38c670b30b3721317580965d19df9b6e80db5da16b6d80e4d39198de9a359c61ab79e9b6a7e95763531a1382b06a751d19bf1a0400000007c1399d27342a65a03365165baf4313a349b3fd0dbcd28ad796dce3672eb78a38bc4b326190fff6b60eee577f28f1fe4de15154cda36d46952bbd284896ddab7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05741891-8657-11EF-9BF6-6AE4CEDF004B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403122da631adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2372 2644 iexplore.exe 30 PID 2644 wrote to memory of 2372 2644 iexplore.exe 30 PID 2644 wrote to memory of 2372 2644 iexplore.exe 30 PID 2644 wrote to memory of 2372 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2bcf8d5720145436742bc43a566b0c24_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a49dca1250c3d226159f434acda7262
SHA17425ef2c6e8448c9c7ed3a25adcc87f6bf8aa38d
SHA256d0fc56f55a640de4fb2f1d79e0c16e7df18a6748e063f399f9d607b6efde11ab
SHA51284cf9e350702c22a944ba83c8eccaf632c6f9f6b0c4d1d455e2a9eb688923bf0738250d0bd1cf9ca3b3dad43f78351ddb99271a3783669703e510b8d2654a4ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519271da08e43e3a312c576677b4e59e7
SHA1504bfc397dccc71470aae93a3602dc610deca5ac
SHA256c06750127145a3ea1aec69ca43f7705739a24fc0b8362d4ee203c2c7dae37b1a
SHA512d6231b4a9eae82e401d5c694242424111556dbbd53250a8ad8af3551ee5dc84185b6bdff8a15b047f4143688e99d7d6bc8a4b3b0f42690331e47c131cbe593ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2a483adb2490452e4ab421781635c06
SHA17713ad7432081b3c89687e41fa6df5d93e976a8e
SHA256a7e2027f261fec3f9105137b5fa37f347ca49cfee65c5dc93423b135855457a9
SHA51246404b368293c098887d1f5513a99e4fdb0d52380054d3aee04d0d3b4ec75ebbb13ca69a299b1de86b8048031d8e969815832816fb12b777130ad957bec01c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a468a287d646ba1eeac064faec951602
SHA158abe2314fa9caa272a326f416e9f813a33cc51a
SHA2560498c9ada0ba5ad72f8f8d469d389481446b75428e6ff57e19286a049212f6f1
SHA5125538cada99d733b912a6955de900b30122850d60a2c362f5f5646f39ed71f2b26cecd6892bbb5a3b9e5ca54cd9f051c7c006ff4470d61d5fa4d22dcc1d609897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aeeb261fbfce4a436238a08d9a3c8e0
SHA17a15d21c07ac00afe9b263daa223468276251096
SHA256d3c4a911a7fc7a79d0c72664da21efd97f5977e9d9d56bc87d6128268e0ead2d
SHA512b676d9de015ba6cb76155254f537751d250a1443066934b26a508c77dbe0ef00aac2bd55513f59a791c2f95e756c2f684c481108173cc0eb48f4704b70380f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e7951fd7a5166c10bb6477680a47b42
SHA1ce09d22128ca4988112d7ab38e6dd685571ea63d
SHA2561141daf24d636d0682af517f718be3e55f1110fd00abb5e141ed6ce0c6fc7849
SHA512b805c1d6bfbd60d7fe6db354cd19e2496442b247c18026332a54c2c2a227abb79606aeaa58fa0a26e62472501545184cdfc287474e44c12d8d5ffddf1ce536b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e42d5d03f6811ead875638c5d74094c
SHA11222a9d0dfe0e38d95d693cb8469afccdac6ea4b
SHA256e7ded9b8533df32af2973d4508bb374a1f229440395f5ef16a128bda1331c740
SHA5120626c1e707686584cfed41d76e1cadb356db7d49f6d2e9663ed1794fbb802151872ec2fb13f7437a7b69fa4326c691e27b617f51d2184dabcf0663bb0b6360f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5786d8a5b7f9af90b33320e0e53ac6f1f
SHA1e1c16fbdd621b154d5030128fc047ad7368e3f7b
SHA25616160bf38407c56fa665e9a63e2acded5c4097eea03717851c4ab42d89999e10
SHA5127871e170a76efffc8c3f4bd7fd2f29468190e8da9e094e1fcbd693ddc8500bae50960d833e85db9a6d45b99b20d26e4d4e20f666d0642d74c249498f3e18f625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f834f8ae0ebb414a673b0235e9f8e35a
SHA14f6e3cf8f42b259b9e76a80c1b20660b60657810
SHA2565d0631c3d72e4269f9b5a5673a62dfbbf3c59fa168b909fd700e9e17fe8fc7b1
SHA512d6882768053576f3f6d985518efc8a0512e51cf5125efc82eb01a20fa8f2cbe0dafdac5b38953d3ae6acb31cd5da8aac8cffd3a290c8d580bc4ceeb52d3204cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5330a79f775d36ee1d9d6ab439cdcbd8f
SHA109c2526239198898be69d9401a30e706664d1023
SHA256806eaf85d81dd2a9e24f215fbf0945743626b810d96a2f1c230657bf3966ddb7
SHA512459ab0d0c1d61bef449984effb9f961cb818407221c7a712d00781bae1a0c5f6e874eda055ad2b8ace27e40e640d7eabce7cfb13218e1f64b1cf22af9261f9ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54052c76250e688926b5f3a307fd9df66
SHA1a725e4b430c861a2f1795be698e250ffd443360f
SHA256ef7fe737738be3d211040c1d3daf82f8d925d05623e875219b8a9da3ae0cf002
SHA51252e30f392ef99303adfbdcc1e9f84ac1082ac7f0254a3ea8d78f3cf98f96aad2aecb7b3bc9a7af4ad634a13c04b5cf6fea24010dcf6a3f4350c26b362a5858a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53881b403d9310de2957b3f673137b17f
SHA1b61f8ff981f2053832e841c38bd8cef66f6cee06
SHA256a0e1b9412a0892ec107d9e401d2b0c7057fb61e638796ccfc1908ae3d1d91103
SHA5126e56b1c30364e8cec74bbf1c408e101136d30b3938926dec18bd971131ba3034c244e6b422af10d645e2eb8baf61104455f654596d4a4e0947822bfd48302cc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52df82f1842156aa817a275f004c274da
SHA13bb6c0fbebb3d1e675cb9f92b7b29a812d1e51c6
SHA2568daaa0e5e1da26049cf2b69696f941033662291f00a2a60533a9fe41643be8be
SHA5121e3e6af48667436e4a4b2537c6d89743171d6216ff813702c1263bde0dc8097eaba4a3684774c320dd460b41ed3a83da1a0069dc9612d3af3f2c602ff2a2af93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5057320f775425393e712e38172a125c5
SHA103a08852dbe7b75ffd6c6108aa2dde9a4a0a9d4e
SHA256bff189639089868c4e9491fed9e4e045931ad1ba859f7fc0e4189a5f0c24e060
SHA512e62dd1be4e2c79cb95bfdfd96f8f9cad8b2143912a5d478d432d73ee20c663fe953a51138dcc1d6fa06911d63291a8b0996cdf9fcde34bc978196809b41dcb3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5402827beaee7e80c924f3b5ed4a6e0a9
SHA19548d7e86dd2313798ef9e5de624032ac8d04afb
SHA2569371758ebd1adc25a5ebd1e95222e4fd893d22b1506cb468bb41708b3968b64b
SHA51244249f1012798591132dc23a134dd995d475ad4802d947a0e59f2640ef597a3a967bbceb77fd71b88e0d4400e581b0420bcf5d5b49935e3a82f545e8082c8f7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d2a71bbc52bb1eee221476d1af252ac
SHA1e6dfaf3438c3dc380cd4155c0f83d864460a7b25
SHA2566ce0a4101a14d08ea9f0fa8a6de6de6eeacb664baaff978891f06cec050db498
SHA51257646abc2711d11cef0261264c5a8bf0f6ef3dc2ee3f4856f9044efcfc8a97e7791f9751bd8df5cfea7045e3e78caa59ebc46b9b3e19b07a126e6d23a0556301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1991a4aebe940138c413930b45e8e11
SHA1002bd14d6459fa1d88d92d53e46006f948f4ff62
SHA256d15aaf0727083631438a4f75649d2f80c654a7b293b7dd5050420d656d5ef353
SHA51278b72ce109adb2aef09aadd1f55a4e6c941b7eaea982dbe56bc1641c9e412b3f83716189a6f49baf95b268c9e87eadb66eb8b194b7c6f55d25e8d2774c5cce55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e6da4ab042380ed509cd57e4c900eeb
SHA186f7a184878e58f53282a46f5fd06cb241f0fcd8
SHA256c5b50d683b263be9d66d75520a7cfee4c8e3f980b3b45fbe3c1acd12aa449be2
SHA512a3da8d822b9be707ac3a4d57a10ac7c83ccb45ae89453dfac3dac2bfc7737bfd0a3c16eefa72909ca983e6e9de0b243aeeb151f0975326253b7daf297af711cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad0ea03eaab5cc5b964d92912efb37e3
SHA107baaee875b806baf2cbe0c42625cf5a43f67ce2
SHA2563be1ff6058d0f9f5185c4c358e0309f45bb9500be2493b6b479450143d65e273
SHA5121d804c33a1a81cf6783feb071c86b6003e09f3f72da852b91cd52251d4ba3b00066534f42b3fa360a8b32f88a818030c07a2aaec3551d37d902ec613aaff269d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b