Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
14d33f4bb68317dce642f20a097e2852_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14d33f4bb68317dce642f20a097e2852_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
14d33f4bb68317dce642f20a097e2852_JaffaCakes118.html
-
Size
226KB
-
MD5
14d33f4bb68317dce642f20a097e2852
-
SHA1
a7dee33e9e87998f7a9201c71f70e164d7c45fb3
-
SHA256
1803c921f4be6640981a48ef445abee28ba847a93bdc70f9a684f589e27af46d
-
SHA512
7aab469c067b55fd2ae8b9d095d23998cfa8c933dffb134bd40ac77c7d288359a04ae3f4a90107206543023cc1c1714006e917d751f88e2cfdb9226078bde86f
-
SSDEEP
3072:zxyfkMY+BES09JXAnyrZalI+YuyfkMY+BES09JXAnyrZalI+YQ:z0sMYod+X3oI+YLsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ee21839c16db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE9715B1-828F-11EF-A701-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000f76831fdcb40d03e34f4e981538404d7725a25413dc85cf01744e34752c6e28c000000000e8000000002000020000000fee405eb615fd00f0512bcecec5d89e6a617383292ef9f94caea0347ea9b1e0420000000fb08e4c464c1cab68b1020fb2fc1f7593586fc19378a7c67f4ef33f6ee734acd4000000040c2ee45c0a728bfdfb87e94adf74dc74e72a51e6afec0401f383ffd160093eb659a357a6ca4bea39bc3477cad37e23797e0e004f798f1dc50c02adc224c3194 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434235776" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2032 2872 iexplore.exe 28 PID 2872 wrote to memory of 2032 2872 iexplore.exe 28 PID 2872 wrote to memory of 2032 2872 iexplore.exe 28 PID 2872 wrote to memory of 2032 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14d33f4bb68317dce642f20a097e2852_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5813d982cf6011a05a754b5d5e763952c
SHA1c052eb61b413d50b7fd0186a1aa66e5f207e3f67
SHA256da7305e1105ed1d3195d2324e7f19a1248dee8dbc349904287e836e77faa13bc
SHA512c8d27cbc6dfd53f5d369b52e96fd066f3f92f117530c72611d54c6f600f2f7bd1a04f0bf5674c031b8b994bd417a4c574cdeb78aa8830ee7f1d03917da968468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59201f06181637da9fd3d71b794ff71c4
SHA138ee4823aab72e2ac35effc107478c4479274721
SHA25632a48c42edc7d8a5a3d678216c9f97600d03bd1565e6452b1c006224f28a60cc
SHA5127d9e7e0bbf3dc88796270f3c34a1923401911f40965220789eac2f4f073e1c3230bf2fc23ccf389cd3825a9b755e1142e50928f6c49c6c5e803b60575bf9564c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1ef3bbce302e0d67f6fc6a37839bac4
SHA1acfd181b36fea6680ebcae473fbee9010982e19c
SHA25673f444d9a6bc65eb94b191748da16a7ee3e48e334e61e26ce3838ba77204d98c
SHA5127605ce1d2243b245abba288aa4d3ec2be915e63596b2a6aaaeda0f21d23fc7d5277a0aeefaee8626c0baba7bebaad8fc5a069ac8d172cc91213ff9e00e5e1cc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a80bdc1e7773accd9c468bf3e4a82394
SHA10149c2ab5c69436253b19e297af479e73c4a1147
SHA25681bb44bc0e430e371d2b4457fba3b796421e72257990bd851d4c251a9649226a
SHA51232eaa6eb44d88dee512951e5f8d38d154cd3c64c6db995fd16d9cc1e1afe1fed0366de0c74c74e5529167acfbfe9e96e9294211ce2ab3cd9d01a237a842dad03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bae945b204e98185cac61d5ea56a54c
SHA1c2f345ec56f65e2a161ff7ed3c32eea924d5b8dc
SHA256a3f75593f98949139a04d1d902e11eb02cfb61057c428c1deb2bbb5d059a3244
SHA5121f147f0e34326efbc80caf1f08310d3af3e0f735fa3a58f8726bd987032c67c3ee699ae816946a08bd3029e0f49e379e9d45adf57e47691a6b3851c965e62771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564337cb1b7e3470611be03c90a41590a
SHA19caeb69971be5a6c4a8b7a37ae50698251380278
SHA256305b67c0a627a4ec06ada6edf5ee882bf0d13b694a889f7c6154aea724216bd3
SHA512d60bab326e9c52e2f2dae531c72ddb7b6ddb7b49eb623bad357fa4c751605f828e37df67520303fed23eb63b134d7e8d42e2546cb2b5b569abaa17ea187f5891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521bf92a7ecacf74928de4b50c773eb89
SHA1522b34ebf1cb2c026c8b21b81bad62264dfe0bc9
SHA256e296c501e23b35e1e2fcf86fa4779b87965d1f891a203bc7ea2e5103f0974246
SHA512313ff4fa0e74dc5e01bbd378526614663b91b5f9270e98c046c889745e0e994f042a3ffa0cc5c0e3ae0e5b319280e5fd429e8824965c84b8abc813b3ef4d7979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577ecdd0220cb316463fe9f5b0de6635f
SHA1ba3ed29efa500d67408c651deed0c69de43cc360
SHA25667028ea2b694befd9bad06ecf6bf8469fef3316a95b8cb6f2ac1f43793097287
SHA5127c0a27626c8385016684308f6b48054c592c69e3b99a5f24fc68aa1425c2be70858c74ee682743912d0c73704f8112210818ce093b7d7a70fe7df003354fffb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529042bf5fe22bd295ab6d1beb0a46d2c
SHA10684832345c4cee3e50b6c5c7086f7232fd1c677
SHA256843a7a69ca99dc98060fc18867b107a4fe394034a1e71d8aff0c1a524bb84b10
SHA51257ee4530b7268a926f365f944c48a8ad606d42170fd103e2540ed9a01ccc2133201c63b3af55dfd40ee5b24afcc93557d5629b665cc5d8b71d631c1fe76c7bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be8b2fc3c025e6617e16ad9c12d9c5e9
SHA1912ad4a315d7fb55171761595524fd6de90870ff
SHA256555e8ec8d61dcb88ef9e2e8bd895fc39ba55da7f50aa6bf6b9268ef282a4e97c
SHA512cf7b98d2df73af75a1875cd78d573e60199ee39d20178937592178b616461df271ddb6b0409b8194fbc2350091cad716e0c1ab16204dc06b906d513e49f5fa0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581edf152c99de8c22d2b8eaf8f3ae727
SHA1f901647bd3c8837238e2da6ae6f777866e1b0a9a
SHA25647bc404a3c1812211a86b20e463a4bdbcb166cff8e3aa1fac19a622b987392cb
SHA512414e0048d130a8f015d2a766752f9a92c49eddb00cead50020f3ef5510c2b3890af8a0d892a8afeb5b59b3f5dcd91ed372fa73a8fdac3febb01f9f64badd04e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5647297104a6e6c4456c59db7e665025d
SHA1df758fcafd89b8dd6d37bde03ba046180f822e65
SHA256fff2c82a5d8b3069d293c7e25687827219e5a8504c8cd4a030c1243ba4e8c7f6
SHA512385f2f2efbc3504959294ac1741add4562865f5bf19dd85d32fe20df28e10d5cacfe1326be4f36a04dc61e59f1733efd2d11c30479609c817ac2ec0f75c61a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53548860e4ac5e91bd754f2539fd2e727
SHA1079113936d836cd3027030fb281031a5b541bbfc
SHA25642ffc0a82594ec09be6595327ecc55fcffb216a506106c73eff613460b85df40
SHA51297c01babd72989582dff455c0d3287836f8e5028c4ef28e3c277833b6a838394f67e13f288f76819c6fd50d7b0a2d37232d9f3c95bdfc4290199bc958e23d213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547cf323f821d92e7cca652b4da400532
SHA191c5e1aa26f24029d562a63b2296d182cb361cae
SHA256dca4512bbc8a19b97f75903323bec89d07bd27d58a5592acd40c46cd15c8ff74
SHA5125fc121ad8e046350d6e06ef8d87f421452071960c15bb926f650c63de9a5ac484b9b130c90abaf288bbbe7074f6ad1ada9c081b615f8361056baa27e971cc78c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a1b3d7645670ebae9cf79dbc67a54d1
SHA1fdfaab609aaeb84151734871dbfc96bd4b02210c
SHA256b4561aa9ba54bab0271f2be377c1bb556905dfd99f601c30a5188bed7ba5204b
SHA5126890f65d175a76a4c2f4838f1a283e08f3719b8421fa3a4922e8d1493d0e2f1117a905da8db95761b5091758ea3f90a560d3b67b59f2ab1e6bfe12165e8b3750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529a14ae8cfdce084c70a02322b1fcb09
SHA133238a80ec100f11b12a4547e113566666e0f88d
SHA2561bd56634b1a74e52e8b5d6d77d9e3fead2969229450bc74e83bfa55356e88f40
SHA512866e2198b8fc24702ddacb1ab278e0332ff463bb99b5fcc7ab5b224fd033321aaa9a17ed3baaa814cbb7605ac20cc8d7805aa4e87d008e876c568ac46d561950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bd0f999945936c9b58d787538f7f22e
SHA17b71a6bcadf386cd683d2327adc13fe3ca0a9342
SHA256b1b08c4a36016e4c3c313c0f34f8e30f5f3a5a030d8a88ff46cee1078bb693ad
SHA5124f2c0c433022315d23d9d0123459279df433fa23ffeedc37bad75a097789137f492c3e301bde2a94ed5155ea214fdb614e0b94ba8c0f84bcc6a1afc6f83a1b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c213dbd37e57648f0c4941c6448970f7
SHA1b0e70b4b315ee5ca3eba9dabf10ede91b30275ab
SHA25653960b7ebd67d02ea57e153dd0519d4f9771393fabed809f5b4af402730cbd49
SHA51224fc59cd3e7a5003b05479c848bf119a1bbbb3b08ff1db0bcec68e01ef93991d3c9d0320df5f688d3b39a3130116f257538156b3357023eaceadff7014d1dcad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ed536001ab73d9e585dcaba43ca641
SHA1b03105edbb98c3cf0387851bd7144a138c0fef6d
SHA256c7df797c06a61ded995f1836ee4a377eae4eea493bb49dd56aaaa4bf1d5bf269
SHA51214fa62cfc241d26a003b37756876ace878f6d4102ee5f120c74ff09d9e29ac00d1644082d33323d01019f0d57d401cb2c04e6d16599b1ae59df1c3d6f4324cfc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b