Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
bf35e0364662b834dd6b3536e4e6dc9c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bf35e0364662b834dd6b3536e4e6dc9c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf35e0364662b834dd6b3536e4e6dc9c_JaffaCakes118.html
-
Size
6KB
-
MD5
bf35e0364662b834dd6b3536e4e6dc9c
-
SHA1
87c894814fb2a7d79657fc0d9f5f0e945cf2f28d
-
SHA256
c229ac96bc56cfc61529766637f28e3064aeffadd737f66fc7a2e69804b95056
-
SHA512
4a1e7d67ab927daf294907a90140e4ef540430f9797546151bd0afcd5f5bd191435b931b8aaaff5069e1778b5144eaa6d4406c5062ab35743711dba67c275303
-
SSDEEP
96:uzVs+ux7h0LLY1k9o84d12ef7CSTUJp/6/NcEZ7ru7f:csz7h0AYS/s4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000079cf700f717d4be3541a77c481282362ac21f5b17390d261366cc4aa9ea62ea7000000000e8000000002000020000000156088f24f0e032a59158804346f22359488fad124e136300db0e83da114df3f20000000aa41d64362c10c48e020eaaccb8065d599fc65f0c285cd6267bd324865df6bc4400000003299a61d9673ade525c3c775dd42f072308929f48371fbccbeab174c40e81181cf26473d74577d5c356781e6d78e091abda1732a7e60789da1412b3166a28343 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC8E2F21-624A-11EF-845E-D61F2295B977} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000093f49013069c5c2d8eb66314dd4d8f800b4e103ab151197fc5e2705f160f3a0b000000000e800000000200002000000067f07031eba454ecc6b03e2eea0a606a85ddde2f8fa112bf835d3924d11856c2900000003a4cd5e131da0aefbe46ff62599d88eea98d5a7c0b119fb03f1c9351809bfd978626a515d0193556a243913a4f0e90bd01e610f7db5510ffb74598dadff1d1e57231ac6396f3f0d8a9b7e347e2b5fda954592be1c40105f03bd3f3fb4af8ef93a6acd04e4e38fb2c1b733c9297cc9f3de653588da481d73596be5da26289546213000523a76025fd954f83bd589565dd40000000ead9b837e0f371266126941d11678f5647df80acc2a238f93b4e5c69eae74d03ba177bb582b2149bcb6ba5640929a8f1ae5debc83e2f1b902bcc2581ddc6d334 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430687701" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b01c9a57f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2800 iexplore.exe 2800 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2848 2800 iexplore.exe 31 PID 2800 wrote to memory of 2848 2800 iexplore.exe 31 PID 2800 wrote to memory of 2848 2800 iexplore.exe 31 PID 2800 wrote to memory of 2848 2800 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf35e0364662b834dd6b3536e4e6dc9c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555038cf626612f6b317138a1b17524b0
SHA10cec95b33732b17de453d72e461953109a53fab6
SHA256b2be2da315b813db1083eddf49b636b4d9f5dcb08b8b7fc3988f8f12bb3b2ba6
SHA51277195f3722b17eb6319f0b1e0d12707d1de7ecea4a2089443976c7bce8c84a055935f425f9a278672364e1301f36f45e1e83db6fcdbef3d79ba2e8ce3abe722d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5050f058088008e09f97cd9f2b0a10e6b
SHA1f353aaaa054c9010590e491ac1615add51b4d18b
SHA25674142ebdaa62da0bfb8358698f254a529db1e25f54e0765dd0ad6603a58fb2f7
SHA512bd896374f9749cab22dcd9aeff9d55436b5fe8ef44bc12aecbbb420220759a6306adb3f1e8d53d77e29669d2c434e9a4e7acfc30073b4e749bfd68b7a3731492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5fc3d5af9fd427195148b7462178d28
SHA1f4d94dfb9350ef8f7f764e81f027ab75cfe54190
SHA256c04905ab6e24531021c205161c14ef26d8f0b2b56be46d157bd570ac370e4ae7
SHA5123c49c760a9f83b1fe3d73ebda4f2970cc233cc81a1f47de73ebbbc7eb8f780be3c206643be6afba4cbd074a70c2a061a4fbf8592c0d4006273e3b613bfa544ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa29246b0e41ac151ec73073602beeb2
SHA19e314aaa892b4d89c3c7574a4fcad4dca2328937
SHA256dc3638670b1d9dff986947b702f5704a014a77a7166e815601e00c59fe197cd9
SHA51250d7b8c6cb26f80e25e609982c3cf35dc0f95219944afcc18872a06f814e3ba4038c545b3ac13b81026a7eca17e863f1e6cba3fe5bde098802f0ecb689fe5e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ec64cd78cc1791840bf81c2ad8dca9
SHA1530bd3f0945c29b3729a9be98fed3ece71b2748c
SHA256d3e618da1e2128dcef42d802d74a8c6c97b6026401326115f26b98f05a88b7e7
SHA5127048e7923486419aa34b3eae3b30dd4dc299072d9fc1412df5af0c9d4fbad74386917d036d67ed084c86eecb306de5dc02e750d625f4d5c33830faa4ef903faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534e02baea0efb8fb5c04c028770d9d77
SHA13db0335da83f5b5f1873fc7e29b07224203ed504
SHA25668d2142423f31ec14537025e83d17a3d0b85b6b68e1a44cc7348bd8ab1786572
SHA512a1b9aae9dca13d2dff808923eee4aacb919b3e59e0324183b52cd8764fb5faad140ae16d3570a99333c92a774a53fdcd92e14683dc09af2ab51988ac95eb23a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c14f7a20393cda4b5175a85faed2e0a
SHA1e5268d40b22031ed03a2f2171a1ce5f17437fdbb
SHA2560d5e03c5792618e5e0d73fc8ace92aec933711536a8ce5398fb3ffd7fe748346
SHA51271a5b335562bc14094fd2d7f8e9d803696f51f2d8c86ac26b9c3163bedf88fefc65761ccb5f47965c1098d63e59dd5064353acb4b5585b9bb78d9b268de6b60a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55109b4d8050cbc4570c5be1088d1d9ff
SHA118c1a98906dbbef65a09d82af31ae8fb6cf4d9be
SHA2569ec713cdc0dfc9a367a38ffbbbf2bc44a6f2ddce905f118824eececfdff0bd44
SHA512c33eb411b04e516905c5311d24d2a158216348670e0930555b0bd330988739a866e63231d33846f31534682d7cb4a9194e23ee4f31fd8539d53936764b816a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eacbbd36961eeb32f1a00bb4363c0ff
SHA1bb1d43218288dc8f2ddf545c59f8db313831f0da
SHA256efac8b4d03f5aa1237c509ee8939168a5603f0482f09f68c516ca07651fbe762
SHA5125adc70593d58738fcfa73a32a72fdc4f511b9c82fe8b12081d10743ab5044061bad58da61331368fcfca95a0cbea6bee7750aa7571615774063d4a376577c578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5d0a7c63882cf912aa8fa82e0e5ac04
SHA118f9aa31b89d8a6566ebba235e526bd8989a0865
SHA256628a14f6a11f0b1c6c2f9e3a5d7b97ad1d51ee9ef4a44d20014034beb14f44c5
SHA5124dc1abcbf2b82bd344341e83786ab049c695004085d946e9f1a524ff14a59b88293f348977cbc15c636d0ed903acc6e1288c48325b1ae9dc5b1949cb2b11f33f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc78c576341dd56e245dd965c3e9db61
SHA18c3256d39ba2353b71d7077e2d160122898a9ae8
SHA25688bab0f6286a0f49d63d39a70d93895fb8a21f3f2373fee89fce1eb50b21aa5f
SHA512f3b2aed22c9a580c11f95bbf1436dfee647c5ffce68cbc9a989caeaa13d792d1c525c16db698306d7913c2f6d6fb49c1d0d07030ae58900f36aefa5af8932525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5151662ffe339fdec14ab68a3d8d68f63
SHA1ef55bfe4931cf483e0705f2e2bff1f1ad9b4ecf4
SHA25636276cea9706c09bb32c8bfb86e4de1e02ee09da2b1e3677913a6ade1b3c0e9c
SHA5120f0662e23ed417a94cb671b1d4ff64d8e57427b89ef1e50e22806bd5091126af07522bfbd25b499c1d0f13d24b5fde3daa3f0bb663f9890fbdac9136f94e1e84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52351e14ac9a4faa27165e42df78b770f
SHA13b1f444884dcc5fce68bfc12e5771810d22ac9f6
SHA256da360cbb964ff34ea686f97bd49901cf32eb76c5e60d61e15420c5b4af87ce4e
SHA5127d79dd2098e18394217004ea3125f40c61d51cd4300ee7f6959fbce9eb8c1d6daea419e0c9605c1508652d6f331e2a96dd3de56ee6e43cf096c4fafc1aeb692f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa0b909582ed1099067073fc2c1f7f7c
SHA10c54b2b8933f4115922dc11eb4da0a65efee2fb1
SHA25693cec786b91bc71c130b1d6ba1c09ea86274ea7f6aa6d34aa2b843407f06b853
SHA512f64c01ed2f0317d717b458f3d8a66e1d15dea10cbe5b034a030cd0df80f5053dd39f149e34137b2df706ee4d760d73a83bcec1564b5eeb34026b8acad57eaa64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599f619f100838b374744ee4f3e2bc7fe
SHA1874bc9b447dfa4003ba8d2577403890146b94bf0
SHA256f69b808ef2237477df379607ce1d1090609be3e346309cc0272fe370b29ddf5b
SHA51213ab04ea0d86ec6ce63850e12bab050e19a293beddb820c7f2dc3dd8ce8228470c3a2460990d29e1be9f619b07dbf57ff9fb4cfea1c02eff0b08b69e0787e3c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d2ebd4e97be28e445b070c1537c087
SHA1baf6348df86462bace14b2145cd9a7b50f8c2463
SHA2560f5f52343f9cb64f8830fb211a2b71bb6bea5aebeabe756473a930ceaab5fe6f
SHA512890bdd31aedd6c8e96588f94fb2e41978e328cb83ab8a3076325b02b0b52649db8e025a9bf30c78d748b3f1dbf22249086913ead06a3d8b19815b9929b5f27c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ccfd742798f9827631d63c6be2b5204
SHA144b3baa31acbd74bc59dee53276bdcbb3bfe26df
SHA256ce5cb1a7a29b436b8a226faac8210063f1d63d2116da18ecd0b67a4a585ab006
SHA512d2155838fb94671649d1c92190746c7eeef366e96b70196e4efd46b6a5d32dde345fdf280967a42e17c63f75280e641e16c72646ba2b7f2921c4a510eed6708b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fb6572ebe8854ac173e33a575d96c9e
SHA1b438867aaa61b81b3467212a950e54d2a4a1aa04
SHA2562139748ccca46fa384e3e37b3b959dfd9e4babcfe7962f92d2fd8ef433c94f01
SHA5125f643d0527cd80f0cbbe7ac693c3c58c85850fc50feec17f603737c605e3d84f77c8c3299419ec919e9998c1f8f8124434348aded78f8fee6a16c9afe6848345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51276ce233a98bf4aac9f07481e7546c3
SHA1a7ad9f2486b325fdb65da8ec51b5b212f7c6e936
SHA25624168aee26ce9603027363a98a43f96c3b4053002f2a54be8046b267083774ad
SHA512fe2c64a25aa6c90ab5bcdd7854a5f72fc20065bb379e785d9961d948d7e23e5bcb0793ea0e82f5d0a15f4954f52cc453a45b22dd54d80165be137e515657a463
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b