Analysis
-
max time kernel
139s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:37
Static task
static1
Behavioral task
behavioral1
Sample
eac61f16ccb57c354aaa75b5115cab5f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac61f16ccb57c354aaa75b5115cab5f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac61f16ccb57c354aaa75b5115cab5f_JaffaCakes118.html
-
Size
348KB
-
MD5
eac61f16ccb57c354aaa75b5115cab5f
-
SHA1
9c57e6ed6bfb52ec14ccc3799921da4c2d2bfac3
-
SHA256
5ca3951f13e8c4c8a92f1f03c680f71ec4df6af86dc8fcaecdf5b3ff241c94f9
-
SHA512
315c4e8eabecc8e7e0b3cae718ea7a9b625a148b7571c006034b89a205e4f1f722ea44bf2aaff58107c1992cf27f5a0672118a48808ce4d7e714618951fd1ccd
-
SSDEEP
6144:SasMYod+X3oI+YtZsMYod+X3oI+YAsMYod+X3oI+YQ:d5d+X3R5d+X3Y5d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d794c95e0adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000004564f7843a23d8c4fc3941b3e3f39299f408ba8e8e107ed18334ef7cf70809c9000000000e80000000020000200000007fb5497009b22b1cdff06d3ac2fb8392326be98507228216cc08d9e7ed8581bf900000009caad3123c7f9d3a11dec36c119182e59124fba738a687842e933711166facf76c93cfcfb7a202f7f69ab2c5d257d3f9200dc7d97b3ffff02b6a7c4445ba664d2eab04be24525b5e808a82b15252f185d4bbdf3050acc5da5419bcf53681b2d9082f8ab89f9cb2605d7b0b9f1258e2241f679fccf1abbf3bc7b033a01dd9596aaa07b172a6bb33664c3b237081a25aba40000000a15521a61c3c7cfeffa92d8d66c9d9cbe204e0cd6deeae8d9ebf9ae513965448ea9a877a7390338556065309d348a0e72af1eec8e5e2d847829ed97bdcc4198d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B46D4FD1-7651-11EF-AD4F-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889744" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000003d722f1a19b0ddd233eaa2f93591b90fd867bc76289f3e161d1c3d522f08ec4c000000000e8000000002000020000000b4ee3d3e27c8ab84445bcd0903f06cf7809eea60dea146343e98939a7a972fba20000000f732032e327d7791f6f5dc0e26572a4c6d416a464506f51526674a49925c797d40000000cd5550f1a2ba88decfeb1887cd2ac6650e41ffaf934b359e6feeb16fb92fc84806d0d06004da07c8eb1bf7e394580dd3145df76371de19ed03cd28256118e26e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1688 2364 iexplore.exe 30 PID 2364 wrote to memory of 1688 2364 iexplore.exe 30 PID 2364 wrote to memory of 1688 2364 iexplore.exe 30 PID 2364 wrote to memory of 1688 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac61f16ccb57c354aaa75b5115cab5f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce0f4a0467dd075474471e3850b033fb
SHA1bb7b08dbb770986ea8e0ef2e8a0aca96ff03444b
SHA256b785cc05d4da3d9d6dac08aa7e510ba7464e1e91ca72146ce94a75a6667a228b
SHA5127e2c554aa2dc9e874619938fce856b34b9f00693232eed4619c133f50d239a0ab510a84140a2ec1507e78b5d5b75a7c8598015453cc6d68c1366962dc76235ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6f329668b518de732f0a85560297c65
SHA10afe5203b02f29f4fb13658c1e64fdb929646067
SHA256ce92c4a8e9736b3fd9e000edc0782574a4d36086b577f87294cfd3959b96adce
SHA512297a0785d2dad54123a924477367aa4a510be1e85e3d21919fbfe3cf49b3feea02b1a64b491bbf0cdfbc4fd29f2fbeb13dec1532c15582621cc3f0d864069fb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5844a5204fcc5880d91fdbbfdb8276330
SHA1c890f038cc4fa99884601b3043d61f3ee11b476a
SHA256015711eb5f46fc5abdc1e6b51a77dac5272f028d3d14c24015579c85a1d9b6e0
SHA5127276fbed7eb67809ed60a6fd30df21f0afd9b010c6f2f8fccd224de0a91456333fc69bac0b1008ae4c26d6bf708818cc8a686525d02cfd1206e236b5f41eb10e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5822c87d1c2f89c9d15d926f8413d9afe
SHA11ea232b8a0eef34ac9425c0c9e44bdc33f1a3b78
SHA25601bf9cee0a9c2cd050a3559ee55b4421f4335944d4ec5c1858ec93c8b12ce165
SHA512d6e00fb59a63e67b7073e883bb0920eb994040db82dd3252a06275ff1743d86095ffb15db290a7968f69f549dae81e800e3b4cbe75dc95ca7446c0f950c07a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1b63a3891bd133ebc052bf794dd76ed
SHA1d4661b51f2df8528e72e22a7319de6e5bab9dd23
SHA256a7b784b2c22a1d25f6506347b2aa9ee07d42607daa0d95b396f72efd8416aee7
SHA512a88eeecb23e012106a7e4a44a3b070b3914923244457180f31047fc0f3f8ae96818861884a300fb8d2a275bd2a3a05a62fd566370bdc5efa701aefa6d33e19fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2fc2780ac94de1222928ad8373fca01
SHA160f8bab8729c2fc9234fa6a9fae3c8d14d3bfcf6
SHA25695469e6e50135f95f9cbb21788618e3346599c3047ba28cdcacb33b45b943a7e
SHA512d539ee3d150a7c8310ebcfc10103adf8966b1c0624b8eaf90d302fa8aa7d1c24fa7710a626fb756a56d6911f9323668cb54207633366c05921392bba6efb0038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ea0d6f054913280c48074dd5c83e27e
SHA145aad6976b1b5b489e4bebe8b9bc5294c3bad6a0
SHA256c46d6dea5004b0aa5b2c8528042558f91d09510edd812c1bd60378368a4f919a
SHA5121121518b1e781f8130e2a81e8a644612f6b6ac66c9361cc2ea44ac83dda598966c4f98c441111c1699db9278a4c2c7546ae8aeb466a2e35c5b4f5e3c28eca01d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571778f1b21fef377631f083041bff25a
SHA144ffaa39bfe9bbc1bf374ebd9976b309241de436
SHA256bb5d6af0d4d458739914242d705312adc286d951d17c7136f3e50c65051cacaf
SHA5123b16c204666667d4992599bae41cff7452fd612a27340294d3c0c1c48a4b1c282e1d0c633064651b8a3821aa1d33b5c8f9d6d19ce8f870abfef776b32a4edf86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebd80447d8af8b3f1db0befd8945f997
SHA1594a1f17c03edb2146959b6e7b36eaeddb884706
SHA256c6d886994722aa7b320d338c6497d7520a1d50346828ff966cd8aa6082e07e36
SHA512b31262512f1a504c39550bf60a4179de57dcc699f943e33f492ef4c9f41e51642978ca9a4a891efb20286029ef6e11f39fba4f387e50748ee5796305ca39336e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cda32b1b0dbff44213fecf9a759ea40
SHA131b566f8778b4c21e03ebb961014e0d35dcc5c2c
SHA256241873e03e11e88fb74de24a2f90eec2188daf94e27b184ba43a14e2a7fb6f14
SHA5128e4fb3eb09c12de3cae67dc1b9bcd07b069f4a4e565a3bd3a91a8a638743915f1907ef44c3a522b343d1722ae3cfbf03607b1cc865372c80059b1b1f30de4d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f889dcf92de16b9a0fa6ccb134eb0ac
SHA16c5abaf0045a411de6b2a4311cb900b07cf50f87
SHA256cef6d25c9764e8d54db216bef168eaed7222db1a114a032acc80747e3f69ba8e
SHA5129536df37b7dc92486e7248c073d2ab463dab77b0a9d91492da2f3f1a9008f05993d6d862f5c67fc6040f38f8b70908d878b1f6a608281070f862d92fe243645c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b5466240f4eaa106554b157c8ede1f2
SHA1bad60f4cf0b98c11ba351483419a224b73c6e696
SHA25645ef824427b08f2a328f18af49cc187ae2b6bbf12b702f9c7a1cce6714c01b60
SHA512016ee59ef8cae6de3347ea025bf69ecbb21c9515be8e4edfcc0e3135e753267e66225c2c923ca2e2f7ef6f4f04b45c645f4357bd6060f6c34cae5193b5b061fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cd689396ae20b064d82de3f739896e2
SHA1a6dcb415c1af8f4a982b03489ccb8d7485d757b8
SHA2564959e2278536472bea49edf6814c505ed311d72b9c2927d70cff0859d388f159
SHA512e13eaf476de5d836dd133d2f9df05fd93db2f016d73fbb7307af2e9d9e323c1388c66c4f95409d07350021d54ea6cac8a9183111671a6819787926fc0eefec3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50911a44f0c26277fe859c8bb91f8dd7e
SHA1bf49ac3f7ac08f150054866e1e10840890a7aafe
SHA256323b2bfc3758de8d1542f04f20a5e5e091e4b14b8a21d8a5fceb1ac243057d7c
SHA512e09bd18f16ee4bea5445f5160e0ad0d2ecf9cd9b42b67c40ee773ae195591598437ea3805585debf3116f2cfd2fc24fadd25ed58cbe7229c36bbe8721a23e88c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c770010ad92340d4ed0f0d711b421de7
SHA1924761d825c2cc181e285b103c5d18f4ab24440a
SHA25648a351677632a3f94926db2a3b2d1e90ed0e13d27ea5ad5c4421b0cc35f7af20
SHA512acc693f33a4d6cabb9b86015de39c7fbc8ceb534a7cbc9af2f3a562971076386a99e7a586fcee003edb89ba9c79e634d46edbe17c4cb54b5957e1109e060992a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588f48c8559d57a111d0bd67b52959c90
SHA16c77d3778bc735e7edec7aae419c37335f4d3b8c
SHA25640675b9e0053d7e6e142e4ba0f23c02e1da0ab85d88d91a2f84c0f212c2d90bc
SHA51211afb8839dee54198943468a1af4604ee70816a0d42c7ec71cb27f456c1ac07d5e40d0331ab0649f32b959f14816f71a1e29db42b6307ab3b65e855a93d857a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580b6450b61d35eb269277cb71b6cc666
SHA1d0764f1ad8493619daafac7cbf2f66d82e70837d
SHA256936f85446cf72685cb61acd9a6c1f41488e35b619dfb3da318b45ac6e01ae51e
SHA5125446248a07ef6a2378665e357449fb0e6ffb3d86309ffb28e60c9c4891c3aad52ad65788d59aa2db65e17285e91c78b6d44b6a66d7ea11aebee759c298b9fb3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6e4ac4b85c6d5810ce34d6cd65f0c20
SHA175d67aaa742d3ccd97026c36fe0bbba658e5aa88
SHA256bcb8b1fc2074242757378ca64f2820221621daa53be6ca9cdb3f3fc2614bc646
SHA512bdb93c609f3ee01d37523925114c1c4951e6128970a886ae3080dbcce7477aa9d7960de347b30e5ce64d92a723ba1ecce704e4174eab7aacf3f75ad7dbb92f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53df066b6a2e7b3e6dda1fc3a220ad2a7
SHA15ff4ff69af2dbf6068bde185d189de8609bd514d
SHA25602f48933d38c2c76486247f0ab00fb50c5fc00a7c7664b80d0bd8c04d983614e
SHA512600b815a6dba53e41dcab7e593554a2ec4db5d3fac93431481cd4bde6ae651ac57215e52858e09d63f325657a94817ca7d9e97b7a28174472c757bcc87ed19c1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b