Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 02:12
Static task
static1
Behavioral task
behavioral1
Sample
8ce8724464fc67fafe483b241d812f1b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8ce8724464fc67fafe483b241d812f1b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8ce8724464fc67fafe483b241d812f1b_JaffaCakes118.html
-
Size
16KB
-
MD5
8ce8724464fc67fafe483b241d812f1b
-
SHA1
fb2fadab1970ea90a5880a449127fb2652654c23
-
SHA256
314de858ae93a38a99ea29bf0214348deb0928a389ee46a5854f14c3b9fb16ed
-
SHA512
77e8da6aa8c2cd26f3be9021f7a7c5cd6b259cf72c0771b7ab422794d5b6d12753ed0c6cef889698c78cefc9816f98db12391bb337c35c39a9cd5468abb752e9
-
SSDEEP
192:e5jSf8sBMuCd6YWHUWO08DdBtGa/a4YBg9tgg9fGu/ENeLXrI6x9mA8H:wsMyhD8Dvt3vo2fGXe19mA8H
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4788E2E1-5850-11EF-9584-DA9ECB958399} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000f6b8c5b8e435c55139908a90adb728dfbcccda092ff7b20508125aadb67f646a000000000e800000000200002000000072dd7326090a7d3908b69dc19160cfd502016223543a5c0bbbceb12727260c4020000000b03498f7cb2d5408f830d094e08bd9c4a7074fc2f079ade096609fa7242b048a4000000054a19ce42c957ab53f1131a203ee2e60b3c3e50896a79cf18941d02b621aaabf6b70bda45cbf53999b488b550ebd2b22c7d61a588cbadeaa34d917f89c4bf4fd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f031c61e5decda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429590597" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000009e451f13c795c8a1b91844521b9930f568ad06c4aef0022d659047f553a275f8000000000e8000000002000020000000285ebba423d2500b157b6ad4cdef74611e4b1f09accb303d12fb3da89723431e9000000071c5deb6e5bb245d5e0f6fb1f0e555c17ea84b93c75fcb62fd09cce27db3947bbdbbdc484376c4880150dcc49fa3d6d64b9567321dbc90c8dc4194ca9dfd3b810589e35f5a6047962f7c2128d6f9d5fe90827bbc4d0d9680722519df967bc0573cd281354e3895d38f566aec4078f021a24516004e6c750637d327a60625bebd4b67af0281598e21d6987d64d29c775540000000b154fbf1de846587b76728adb55574ed58028d7a608eeb38b3c7fa958bec57064ccbd8d10928b2928077a5d4b5f9b4eca87d7bab7e529da00db1b6f915f40448 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2720 2292 iexplore.exe 30 PID 2292 wrote to memory of 2720 2292 iexplore.exe 30 PID 2292 wrote to memory of 2720 2292 iexplore.exe 30 PID 2292 wrote to memory of 2720 2292 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8ce8724464fc67fafe483b241d812f1b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512512a6b7769166a0aa4ca2440cee9ba
SHA13f90ba5fad2b80a056f3d7d72d9c839b9a8bb304
SHA256403107a803a174406cb200309b55576124a65364b758742b77d6f4c4e0a7f38b
SHA5128e8385b6c72357075b115c7fa712d3de298be7bc5391496845ff55b2b3a98c5a5357bb362a519431fd1723235217484c3fc1da48b6fcc8de6ddadd471a299b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585d9070a00e3eb9ab3814dfac14fbda4
SHA1d7f3244e1d54aa091aa6c2863535f98046509e5d
SHA256923e59d53b2118d3aca294b4ca95d80b6198afd88ccbca42d11c6bc1f65cf86f
SHA51255ee9d9b65c7e24e9a3a45280388b058ee4763b1584e2b5cbd295e8834ad28282e774b31196b0a38a4fbeaed2e67a736d538b62ecf75b438bfa46d269e5221ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543052c5bfd90771c8bbbdc149189973c
SHA1b2503e66937eb4684268d07edb50c50e31d3da85
SHA25633227ff7e105a2343871b1270e957462d06f7b90a2ddc71386e4788d683cbe0b
SHA5120a33d04323c07b2f91ada1b4ea602ec2d549d1c2b8cbe45133ae6b523576468719302fafd7a43267ce0d6ccb7b63dff53a690923635c17aa05ede7089009001f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aebcfad9d55db5f8d050356f2487491a
SHA1788653cf2c8907deb0e9311a490cc91985d491ea
SHA25649e997045869c8d0197525405dc6bc5898dfac20961eefc58b75f61ef7dabf7b
SHA512a72c0dfea0ec8fce594c83c82831ba3845faf17f030f0506b6a606f13695708ac4be15c72ca72ed9217b786f871ad76093a0c9adf3b77fff0b4aebd8e178a7d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509af9f343a17e2f3e4706798edcb3064
SHA10b0d8c47526221b6a762bc5142d36dbc191b01eb
SHA256e78606e4ceb36d6aed5335cd8829ceccd611b027f7f40d0b2b01204afa8ff234
SHA5122b6054eac9c413bee521a7340ba52e5a150974dba0936c5a5346596682114a4055f31689032346ea61fd801c4c25e631a3c54124fea516d753ac69d39d16bc28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a72f4c120ec61ddbae3426706acc5113
SHA1c95ddd3ddd249fe67ce16cb9e27c976c4fbb0125
SHA25698727b8da922c2e38d5adab7f8dad0d436f1a7c51e6fb844a4a93c218b0ca30a
SHA512a052410d807c5fa06325c0e4159c9e417c1ce34c48038cb133f6cc5257876429c4b182ca960ab2e5fddfacc53521ba399f7f1bca6e73437a48112ce67361bde2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509395fe438b1801274cd38c96551bd36
SHA1eb2c2e7ec841ccb2c9e4fd9f21bee78590f1d360
SHA256567b24a91ba123b1a74a3a6c916da9ed5ffb95a9902ed065a1e01592f74c0c44
SHA5128635b60636a54d7af28cc8320e3a4d8a150df235e13336e2e3caddb2661ad5342b2351eedb162e2ca106cd8322e2dbd6dd9589f6cbcf55497a1c3ef5ca51cc9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59135a03d9c699fbe9810b35d998022f1
SHA162a0235d7d02b3b297c76df372e82f78cd6aa4d7
SHA25626a58225819cbf0c6443bf261629f16ceb7a3334eee2715bebd1cc11ff6dd5a5
SHA51233959b39987f45c53c7ccb410b1a900a793f9dcc41be42da71dcbc4751e323a6ba8c777695789bc9652db8ffe48664620368cf9b74df7fbc8e7daac03a20034a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539e6aecf90e6d453dbb09704be255b12
SHA135e62d1f120b93c0963d5101ace43658ac2a2fd6
SHA2565378a37b8124f9be9cf6479153988cd837bf303cc599f856fdf3ff6e22d95cf8
SHA512454767744b2b3afe22b5a8bf21e4df0771932c1ccd909c537a5527f29856f1aab8bc01c040384d58891f3ca332df5684020bc3ce021966e2b6a1f0afc96e9c76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ec7efbeecea819e68e5a0d44638cdb4
SHA1579fa116684cb9f140cc1ef35498f15096572d4b
SHA2566b1246dcd979ff8c4990adea294ce47ae57cfbbe0262a974e109f0292415e078
SHA512b3be10fdad0213891917513e8828f55ce630b304d71834bc22bbb9e8c575e1c3bb8376dd603402cd6a49795988f16fe3bd2ddfc81cdc99b749efcd87650e9b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587892cc2feba08152735acadd28a0c39
SHA134845f14eb5c1eabc5ede1e6e5f59bc215f8be6b
SHA256fc6f47b4dde8054262bd58a3c3d3cb770a99cd4f70c94235560244d00d58e54a
SHA512c8455549c5dcca48f21abb7e3adbd0c54d5eea0a016acd218400a1a705de755b7083ba61db55bf6a65748799fc92c84b261de1b04dcf3f76c55ac58302f446a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fac67e78567130405badc800d7f5b42
SHA17468cf18be362419910fa8b61f323c488c9e5808
SHA25653d4724a42066e855a3481e264678acd6a6437c541bb8a4114fdd2fe1808d1fa
SHA51208279c70cc61aa6b762641acc28bfd9ca30a07eba6be7208523cc4d924ac168c3d25f2ae1ad44388a9233c14d49d451bcb2c36a9f8b8b0ae438caf6cf8b32e0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd360aab45dcef3ac38899708e9b453c
SHA1ab733ae28efd75141694b56c673abe6ace54cb0b
SHA2568d818b1ed5a2fac6504ab165a7b5c3a34dd93f30e06b16c95233cfac5cecf871
SHA5124be948ea6bcc8393261dc50eb925ccd4aaf72d4631bed0babacc9c68cacd75b46a4fb421b664aa627a3d81ab95b7d73d8033fffd3efed31fc2df3f637aabf41a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efae4b89a564af77359179c83d34d272
SHA1eea974668d94b7088106d322a2fa5d5c868be18c
SHA256ce600ea1b5e002140b56df0b656ce39d721e9ce90a4cc444e62ae01bf9692e4e
SHA5120fe8a0e67ce185545d6248a7c42d35dcbc31803d4bd7a34eea47c847f3d627862c73c3d6fe73e62f90cc00b3b1ceba9a8c4bc2dcb8a606eb7e51c89eeb6d5fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5172a082b15a2bf6a5cfb61ac7a76904b
SHA1ed48cf74330abbe5d85ef502c14ea550d8b60df5
SHA2569e43810c882e61bd6f8cfbf438d5f40d642183f486eb19dfb4614e6c7a9d5819
SHA512a0fbc5d8660086a950164053d66ad0eec033295caa4772d8fa95583f3f752dcec237f31de0096a018db87688da1ece3a9e8d51edf3ea44b08d9f0f9f3f525540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561744a6a933a4c3d8348684bfbfadcfd
SHA1a67dab88054d03c7db5dd608c89cbf011f89395b
SHA256570cadb1d26ce2e64b1d7b57c25a8c5d5954ee03292700b78fd8b16f98df4423
SHA512ca49d976ac7a1afdb75b262a10fbba0b7571efd3f8da1f8fa90ca36996b0b4bc8daccbb02709a3df5438b2c317247fbbc24ea30e7b012e6dc7bc4902a3ef5b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d67daa7f78511ebd84e59eda1a6d6c9
SHA184ddcec7c98a3cdf03eae6e235da1cd292efa831
SHA25662ba05c57faf1456e3f90c55f98a84b125632cde5c8ff78c4d83a3af8bbc4f32
SHA5123e6d47a55bd7eeafe205f35554a3c3813cc61767ff10a9cc24808af3bcb2e26527ece63737b091f3d77146d614eaff203046e0027a0e36f839a243033adc67e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5db9d750bfe6dafc8f9f0d6a37cd097
SHA103910af57144204803e8bb2c2bf583679387e326
SHA2564fe49ffde5af04b352c52bc6244d382fe8be80fa31eafd07b48839bee001e553
SHA512244c650e8f16a4c02e945afca6ab3f9de9c1ba994df0a4ecfbcd09a8846cd3f7584adccff636feead5edcb86164e5fb8b13e41ad7d2637ec459a3d98ccc24af6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa4ca6f3a57ba45138db275be4822fb8
SHA1a9cc84df526e2b8d4717d955d9497573ca63425a
SHA25640aae60836396d02e94c56a2cb06799ac2a5bffa3d1ea3f60eb126e4ea1e2776
SHA512cacce4ec2c475fb94301b05de2521cf87eab6edf7795f68a581495b2b1345de15777d2149af1e4c68de291c5a518d4faf6c231a95a9296d877dca30d005f6c05
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b