Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 21:34
Static task
static1
Behavioral task
behavioral1
Sample
8c0ed07b32ea74ed8896776c4746cf4d_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8c0ed07b32ea74ed8896776c4746cf4d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8c0ed07b32ea74ed8896776c4746cf4d_JaffaCakes118.html
-
Size
6KB
-
MD5
8c0ed07b32ea74ed8896776c4746cf4d
-
SHA1
190c360c104ea1a8474c9587daeb081f73a8ebb9
-
SHA256
40347f9a5af96941f4015740889eb795cee44089bbc90113b085d93a4ec2eb48
-
SHA512
7316a771ec857cb8e6d188c5272c07e7bd6004ec23464d27a5af375c5da37664ca6351ac004f0d1eac4c450763cfb40826d3ddaa977cf4cf734fc3605da58536
-
SSDEEP
96:uzVs+ux7TfLLY1k9o84d12ef7CSTUqPh3cEZ7ru7f:csz7TfAYS/93b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000ff1942e09e77d854e5a3d20c51273734f73bc0edba7cb26d27d0d9705ce1215c000000000e80000000020000200000002c9e22aaa38b9d86b10070bd3a4b8e0b0ce0c23a8feaa36d1c3f3240c1edab3120000000d0e22c7b7dd474c2701e5968736b07313e9d91666bfbb63f64b2e1156d468039400000006764ac3297579aab7f4bfd85b58516d8a9153c2a0243f620f53213ef7fe716388f3a0c42abcb47b8b888e6f31b7f16eb1a9b505e7ae01684119bb0f194893138 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429573936" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000d2e356a67cd1092f76031afeaa863ee2ebaa81dcc8bec0a1d4e7e62ee5531b84000000000e8000000002000020000000a8d962ca03542227753f8cbb831d77f4e17cb644adf2cfe9e2061b9342609bb29000000038409bb30fe54929da2b8853950933936da87571837d61eaa2ca083b58222570185738412cb49dc903daaa14369124b23d3dce9642de1508a25228ce6c3d01f3b496b2b0397c8dfdfd81205daec0b006cbde713da49618925721c7ea49cea60b70a2d8f137e271d8d3d12969340dd1d049b011ab3c6d500c0ff90a24fe24cd5fa0287542d4a1aa8dea5292938aa20cb040000000f12e3f5ab0d300e915acfcd6deb4f61d344072d57837955dffeb20de2b4789f37dc25fb5051d27f50a71d92adae64e940f7dc2ddc87bc8b1c7845de7e76754f4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7CD0D921-5829-11EF-9637-66F7CEAD1BEF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30a2535336ecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2496 2372 iexplore.exe 30 PID 2372 wrote to memory of 2496 2372 iexplore.exe 30 PID 2372 wrote to memory of 2496 2372 iexplore.exe 30 PID 2372 wrote to memory of 2496 2372 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8c0ed07b32ea74ed8896776c4746cf4d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51da6c42fd55049f4844a76998c393d23
SHA19b47390bba2fa87e625c3ced6aba396edd3732a1
SHA2561b804b30bb11d9586bcfa3f63b3993525504c8ce853043ea5e09af537de5a5d5
SHA512e49a3db3eb5bece71cc83ed489d05ae0d91947f3c4988ae9c6d1d8ffd79127b01555fc67b009f8df225d43f61430430a9babfb77a7b7392b3c63038373c756c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598805694c97b4aef64d83776e0515707
SHA1190cbf0511bee3a053ee3b5282594cc0d0dbcd7b
SHA2569c04f8d667c5f35e763b0d616cb2639e46c8cf87b40c4a2c86d0b48d6a1438dd
SHA51295627ac6464a51450e5ddeed9d2bad39507737a8d047b9fc2f8e07689565e540f2b9edae5c712b8d314a6f268aa978849e7273a479b8f0000707cf5d96c349eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fe0fdf894b1f7c17f6331cab371d337
SHA1bde35e56fe57a35c8bf5f510215f6829dd204b79
SHA256a5ec5c2d37ed72668026c5f55c932d110f1c42fe086121735f5f41d145cb04f3
SHA5125a4912ad549832cb4b1b6a26775ec7a632c144b1ff633c1aa73bc35e0dd34d86fb7a3bc5e4f58d4bd316575b9f688f18b5500c7784a7aeb9df3bcc89b53fd496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592e1cb45f7dcaf6fc5589c50b2b4304a
SHA1633dc727567b91d3c75bdabc842be2e6b3159699
SHA2563f39590202c636690e7dc82420601bc58ba7b27b8361078ee42aa62b10c74443
SHA512e59a04434ab060be8590fe02e163ede636ec47371c2d31348af44b7ec0cfa92e81dfd6403d41fc0dc07277196a2b13db46dafd837979a3b91a6982f4ddb5f336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54112c8ee7dff7dcf45e81cdb7c438b06
SHA1f36e0f5540faf7210625b13fea142bc0af18dd53
SHA25635204831a568015ad526d752aa2299d5372b90fa9373fd3efc21736aa87e1408
SHA5125333dd12ad2501524082c516a328ac73d7c578d6dc2ceb6d01be158748ebe3062375ae02c51051afe48701eac02cf48444594c3cf6a93f38e324b884d6311571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c255775e618f00d23ddcf2229fbe48b
SHA1b26a7aaf0f88484e4477cf18b866d1d113440c0b
SHA25669ad8036628fdfb9847dd9dec7dde1bbcedfe16a1508c7b3094f2b3445b0b11f
SHA512b1a2bf8592d0dd5af430e3486eb34ea71de7a390909e8c6a199821d187161f7b210c53969d6091768a43e842519f8a7672aff4c8fdcfbd1193a9955d2cc9a53a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb80618451ca0fe5937d27b6a4ffe2fa
SHA1481289e2573de098042ffa2c2b1553724b87880a
SHA25692cee06c51520a917516e639ab34f9ed6fedc4b2cd3f4ed680e7e0b882d1ba41
SHA512b82b9d3391d54c26c4cad41d94b769c7b25db7e98ccd9edf676ca0a9b7b0ce2b17125603ab60e62a400ccaac5e194610890bebd9e4ae371241cf70d1ba7d345b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cb3bc79d0a15360a9f884d775f4efe1
SHA137e5d7c9561dae9a5b51fea9e0c350903faf74c9
SHA2566a4925760e15be7c91e340288fe4951a1efe5de2f102fbbaedcd0d6978f81c3d
SHA512b1cc3dbf8e88aa841f49eccdf3a1eb4fcfb709f8f23dd4f227cf10300d4d9ea17b0dd96808e7011f3b77d6661413ec4f55680b10a98d8e4860e542683c053c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f38849e122bd165a42dcd636de2abab
SHA180945c2685548338b2059e3273a2b7a449b963eb
SHA2564eb30ca5ecbb05481ccaa1413e90eea630a6374b74e49b42342bdbd00e68bd23
SHA512078df497d46cfc7f78451b11bd1add29bfc64b9a320795be95b070ca0c9f9592e4023c3c47c8e89bb377fc13b2b418d1836c0e3d9e55a90688c025cac5214386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d51758f19c83d0734181aa0bba1c672f
SHA1714846f1efae13a40f0604c8aa0a53772972b00f
SHA256d78cbbc7495e8303ff4b3168184d7b97c0e3557c26b7a0e3b0f2a5cd5850f201
SHA5122f0542c1ac13fd4c759886d231e75385d99572b0fbdaad10598448fced5d00d033c9d43963f5fdf378469d63106f3a48b0611cccfca8fc2ab9145da982b48154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec4464faa9447b58468f6eb799363161
SHA17e1bf59c5803d6d9189f4f3f92fb79ad3dccadd7
SHA25671de7c5e81d3d20e417c80df775806f42e48d8e77c1a8d132eea77f8f3bcacf1
SHA512060e30c87b60dffa2195877b4c677de8af51579e0cd8e722213932529cb660ae1f4f628fe8c129c6334882665993b315c865e907d0ccda9a2525bf92f789aa0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574d202059eae03755bcccd101ce1bdba
SHA1906fa0ba2486aa5580bd57d9e876c56e4d20b0be
SHA2565282fd1fb6562699787e7b3bf6987835e7fb9a65a82cae5f9a39d4b09fbfd1a8
SHA5126b9b1f8d0c1db76bb87dd8a1d01aa69da4be02ba0738cd23a43f083a9fce73bdc2358b229d27b2a165bc53155d9e92983a64d06784676e04c594a3dcad46cd1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b16316bb4dd2936c8793c4b7c9b18faa
SHA167a3b7646208172d70767db443347513ef275d63
SHA256b932001e0eb83782084414637069358dcec516d0ec6b0d085d33e7d4ae748369
SHA512c66611595ef2da02e3382aa1312bf8d29d428829667a261da3f9bd5864f33d71f445b22c1e734966996273ad504d7affbc353653bdb542fab850afa9e51e1aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e57f4cfcefded8f1ce794811da42b17
SHA129dc0d743c3a1a4ff1697e6b2f4614c2b67450f0
SHA25625ee402cd8bb504cc39432ea966f27245fb84263f5cae30225bcc1a09f7c3f4c
SHA5121db5be06c78819a6a923734e74108821a4c1b4535a373dc017ea609ac239d55669c487d6334ebd9d8f4ac4b8a9e2fafc8c0208920a8e435eb927051af6e719b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5621845f75449dec5352d4b339eee01d6
SHA10ca70592025e43aec2e9837ef89fc3910d4e8b78
SHA25672201968a8db66211270009ff6d6502bc4255814c940eb42e6e853b52af44c00
SHA512dc69e935cf05ced3acdb47552d9e0f23e7681d1419a92be87a34e0127328329bc18e081ef8dbb98b1e1adfe4fad6b12c3a9f4a6d01b57983c5c26ee132a01681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532416332ceb8f5bf9b4140e16b1ccdea
SHA1254c9bb99c31c34a3d378344d4c0bedd20fca81e
SHA256ef117535707fc542ee1b0dd33fa841c2a5eca366dee45b0bd00e7afe44638dc3
SHA512fcc958e4518f7672dd9da69ba6966d8f6d15e35f6152029ea9055d68b94b9eb872f96638ceaeeefd6694c3b9055f099546609625cb3d4009a42b46ed060b4b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf2396a21b08b0d15ff1b39391dd0218
SHA152b0047a62a6d81b338baaba44933567eff68ce7
SHA2564017e289d2a58590158fb79171cbe28d4ddb4bcb8285d76a3b6547f0e2b3e499
SHA512c9a2afde67b1c0ac8e7013b1bc20f7903e70ac86f91032e2a31a2364da9b74c251831eaab75867d66076b0fff555d9b770dac134639b49a68c5098595aa3a350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58306a8f4e3aab609829122aa4c7818af
SHA1cd9f908a73edee0793a3a214133571d6941e6208
SHA256c32b43a6f19fce248a55adb86cc33cdf2750edff53efe1ca5d65bf229640bb86
SHA512d7ddf4b5adb9d8df4fea005d62d486339cf19f6bff81dfce759ce62278b7ad01b53d4c9de1ae79ad9c19eac1e8a97f4370580b10c818249a900247f6b68e1f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a17c5e149268916adb386cb4d3dff236
SHA18e08bd0cc4604f67c97e9e4ec527bde6d0618040
SHA2566b52b962a01dbd803c1610b0f48a736e94f28ea47ce23f06b6324e022f1ee31e
SHA51209794dfaf16f89ccd6993bdbf08fcb25ca7d864a7c5a9ff337b6bd2066bcea86d36d929c4acfaf9edc46ace14064cd5a786f8a04628e913601aac42d2eb425d2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b