Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 16:21
Static task
static1
Behavioral task
behavioral1
Sample
529a98413bda45d5145d7234afb43a01_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
529a98413bda45d5145d7234afb43a01_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
529a98413bda45d5145d7234afb43a01_JaffaCakes118.html
-
Size
138KB
-
MD5
529a98413bda45d5145d7234afb43a01
-
SHA1
0a50da52d3c6db1202c2c731233ee585672eb3e8
-
SHA256
004219a00f3e28757f02b294116f6edbf4e37879b742ff38328cb8eb4719b440
-
SHA512
927855a654dbe500291c5504c6878cee39ad708f9b80b9cc7ce2d8c9ccd9e87a630feb55141ff99caee9a9da5745e28b2f8d1f86a87406c6e112c38923b04ec4
-
SSDEEP
1536:SENitOsWKlZ6yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:SEBsKyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435343980" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000a1f5b5d688c203a96b76121628189ba8862d917600b5dba2cc0851cb32db752d000000000e800000000200002000000053a0eee23c7f5938d54dbb043642634fc9f70dbcadf8982b99cd97d5171cc9f720000000e1df153a3bf839065f259ecdde8ac7e57571c18c52979fbcab6b9514e0b8376e400000000df23d9685dc9201225dca64bfd14c6feb41c64dfcca34a0ca35c182078f11b3e6e064b39d4aa61fc65a3bd7b08e49f1966af721d3107a7da8ab47e40d8ffe09 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB141331-8CA3-11EF-8778-C60424AAF5E1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0864401b120db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2772 3020 iexplore.exe 30 PID 3020 wrote to memory of 2772 3020 iexplore.exe 30 PID 3020 wrote to memory of 2772 3020 iexplore.exe 30 PID 3020 wrote to memory of 2772 3020 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\529a98413bda45d5145d7234afb43a01_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5712472fff1f30cebe7f21dcfc33bb35f
SHA1560f212cd17205f9a39846eab22e5305b48840f6
SHA256b5d2e1339550ea79860f56e80f80f207c07ed02d1bc4cd5fbf248f93550cddbd
SHA5127fd2647550f64055257573ad69bfc608e8abcced8557db6af8a88123268a014fcb470233020bd5710fc15593fd0326fee7fb81c9df0e203c4cfff9bedbf75472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5000d6df35bf1e7801381d112a33b7b3a
SHA1f1cd7ab11257420a58588240de0c2d2301982a5c
SHA25647f91ebe2c503cb40df5189ffcbcef002a061b6509c2e3111fdec1ce5132bb00
SHA51250f044dac45aeb59066e684d006cef0ba040f39ee7e78f83afd65e9d24679d39071d0ed9e8af37c3236f233c5592c4bd6ce4dea6af13a002552c11adea33b988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2eed787ef38ca0fd96d898f1fed2e5a
SHA1405758f4d1504e09d863af21c55f759efba4f4a2
SHA256c53107a850602af4972c1585a9f07951a783311bd2517060ea24b33e97044a90
SHA51285988edcfd0f08c86856788b026861e3ef4bc1b509ed794e735daf116e5f0326c6bc5bf4cebccb46801e333060f11e134e59d40e31a95bc86657ccb484996287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a9e85b4f3b4fedff6511e8afb8857c
SHA1fe638f365ed691b9298f3f92d654a8619c7dd2e4
SHA25635dca1f45f64c6f53f5b7f212be4720e6da3f29387aed692a34136d5ae50bed1
SHA51233ba360b0d28ae4b80a5119cb90b501abd7dec7753a0c56e6af0961a871e603c781426a1aa30fc575ac15e3a1444f73016c93cc2c7d896f5bc31969852fb9e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee25bcb0f418f9afe7eb6a47d6264e3b
SHA11851e158ca658af7d6bcb88c3f15b84b935497be
SHA256c5f51d017cca314c8e0f01bdc62f9bffd8588a23d92f2a71f5d8b4687a35c07c
SHA5123e93b29ee1fe598110d040b66f08dfe2ecddc8bb2e37b5d0fe50a20352b27d9b72794b5fcca63bb541ad4b46388a30595fa6ab7222cb8c8d1822773071221a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c55be410cbb3d5835a5b54cecc936ae7
SHA1044242bdf598f4a917b7e893cbd3d790fd6f4cb1
SHA25692da347270a38b4a169414bf47a28fb0b4ec63e1dab72be7e4a4a01b9288690f
SHA512d43134b3539045b312505edbc5599ce12de4af6f2707a3234c9a97b142c745b15462a009cb4714d087fe7b4aa152e2fbf41ae9bb8e99b717ed6c9ac6213e3426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506e949da1a2b518adcd0c42b2005261d
SHA135fcdc7c30a2f8749cb8e3b7332c150399088aae
SHA2567fcd5f8c941a85558bfd92cfd471beb98c77796408effbf39d93d2adba9eda5c
SHA51276c90ea420429443bf9e6e64437568a38a0c735e80572d079281c07610f2e6e8c9d788cfd7ef3013f3a8223ca29bbbb1c25d96b1a2e565959779f8e879485b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c3ff5f5cf4f420ce6cf6bb2d0d05391
SHA1bcb8645c0aaf67a1ba3cb1fdc402bf3388b0254e
SHA2565f7cafc270e9a52ed68c5ae0a31a76db481fbfdc1e99245155261057a6ab3422
SHA512f6c0fbaec3cb81757ce83e36fc60ab33c00cbacdcd47db057cd4d9eaf515e7710c75cb5c4ac363156da2ad73404fc82889b66a4162d5bdf802847c38d29481aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d8d2a10f742f29c4db96506680fb64a
SHA11d0b99907475dbba2141131c875f57663a158942
SHA256ff28e2eabe3ae2a14343b49de3c58d502c76e6c07afcdb7e93c659cc205ecbbc
SHA512fd6ab649d8c8b37b83ce2c8b88ca6a4637939294c288daadfad4112b700141ddf602c2a7c8d30b054ee228b16e69032455400c8094231c0cb3ce06871b517ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e19fae03423cf8af1824cbc6b9f63cd1
SHA1282de6a14d9d7791377f2bfce34422a5f1ad4f19
SHA25651486445694dee0b74af9a0273ab5bb03518fa4835d8a358d26877c4c31425c6
SHA5127b1c861a1ae971b384c97348d2dc71c3e74113de5334bef51eb80efca9aa059728b28746646758f2b55d124bae58861b476f59f75a72f3f591ff1c1e35e01822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ca905e14fdf1b7b3c5d6bc764bb52f
SHA1dd28aa7d8ab7d925a966c74a547217a9c0e1d9a4
SHA256d7e6e7bdbdb8dac6f67be05471e84b0703a9b32380f825d4ebb5f7226140a039
SHA51239546b0b472a85aa2345eb82cdded6e7156368e1889aa05cbb077f1e5cda8d1f9914f40e264b50ecb5eed3558051369e91e208f9ae024db3175a0db52fb00ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516ab747f69fa197e89d442ad223d00e1
SHA12b3f0e45aa1f6edec9e918789746476453ee3795
SHA2565f6f26ac1cbe773b1cc0908b208a4596d77c3a2c90b9f79803ac9c03adfb0c56
SHA5121634aca35ea38891274c9802d46faf3917ff61905e80039980b29edbc630440b5c7abeb315addfe06bcb21971540370e7f35713e1c6e26af951a0fe0e054a154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a15f0e87ae40a93d55e4b1d98af5471
SHA1e293f608387671a448c4732741f968711458fc75
SHA2560fb68b8c7608c7d9a6a43909cd0ce0d5b23765861717e680c14656dbd9d80d2a
SHA512357aeb2d3baba473ddaf4da75bac7679c78abb6ac765367dfba061f6b33be44a3a63f0fed8ac5330270200264932e32cc41e60b797b8f2538175af820fef5311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cdf18fcfb8ca4da4d51795013b143be
SHA1ef85081008e119c435ce336c3b69cfc9cc6e0298
SHA2565a88bf1776a429d8167d5fc4728c7d1fa5e4fd789af9a296deccf175382e5363
SHA512547198da8c9579b600ba63fe3bcaff6a18ba5f240bf2a370d5011963816cc1850f62fe7c74ec0fe6ccb6bc89c85bd8ecc42e4b5eab9a75f2138e99dcc4affa93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5728a104a4ea7d037ab82ffdd6753b867
SHA1b4c317b9f13b387bbf00dd044dcc3e940198aeaf
SHA2562db1a091af6c8d2c9458bfaef8d3a6959fe88efa4dbf8c4e1350a23eb479a0d4
SHA51201cd73de10ea4003b5b1229322aed91bcf35934931358649ccaa5a99f3d5c326b3c5c16237abdc8fc5c3004bf5fce0f26f2e9fc4ebcc3a8682408d239febaa14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7f4852a9a81c758e98d71a58713171a
SHA1298eedd51973d1a2c899ba16694d5c2178fd08e8
SHA2561e2ffde0ef317195a101d89b1cc64f0ad4b978efbbe534cb64aaf2f96f8bcdf5
SHA512680836aa93225ecc4f1b5783b7bb285b362d9c898143e5c4a78d61764792f5969a732d65757fa78f6712325bef0c8da11d26e877910bddd58149f60734fc4fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e69e84ad6d74f4edf5f285a824e8b41
SHA17dadff6403e7fa9a75287433cf7da08e90cc7049
SHA2567feddb8be44c539bc5ec79e121d81e254a99a3d6667fbf91f2ba4f6aab255153
SHA512d98e4e776fdb5876664772c57568c26ad97612006ad0d32983c4e27e9f7c928562263af20654ea9791861e0ebac59ffaca17459561a688d984a8d6be4ac76ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e047fd64b3b73cb540abb13a1e133517
SHA1a2a562ccefeaad4bea8b7d8aa8799ac6c6572a80
SHA2566bebcbfa44dac425c384d1205c25b30888284bd0f0b9af46e9f9c8ee50d143b1
SHA512bd3ece5edad414268f1a3d1762f3462006d7cd82fda3cb5dd06c2181efc47cebaa2a661258267af4805c29332755b8aba3645dd865c68afec47b72088c19278f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a60809d248cf24daf02add24ce9e83
SHA1b80b740431a96285fbe8f1adf808416962a52147
SHA256157bef98d7b177fb27f11bc309ff57a6c88dd8cbf36086f88db6d4551cdd2860
SHA5122f0c8c6eabc2dacc5aa0acd433d84431878aaf51bf98ab1082123dc277a0a1288d7e5d603d9194679153c225de54d3589bb9ac7a19069e1394614b7f4260049b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b