Analysis
-
max time kernel
138s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 00:04
Static task
static1
Behavioral task
behavioral1
Sample
764d3f0da9a4ae0f320519eb42a56092_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
764d3f0da9a4ae0f320519eb42a56092_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
764d3f0da9a4ae0f320519eb42a56092_JaffaCakes118.html
-
Size
45KB
-
MD5
764d3f0da9a4ae0f320519eb42a56092
-
SHA1
2b22f14c5c7dca2548fc245d4c1dcf99e3378ba9
-
SHA256
281c685b80ce209115b440364f182db90e8dbcf6225b1d466bdae09af68cb88b
-
SHA512
fa033bb8cae48d6f01b53acf22bf40a0123cd1d112e385adc1ce5255df85ec156b04edbcd0ebe15f273e15c11ab06707bf8cc4e8e04612bc47d5b788614f280f
-
SSDEEP
768:6jeW6wjH4XQROfImiSJ4HJ+grSQT4T/4YQSHq6rlGKYPf8IwnyGIYtY:MD4Xm0J+QdsBCq6rwKYPZDGrY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{768A4351-4CAB-11EF-9BF6-6AE4CEDF004B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000b9eeb4e94db32de9cee88f8620ceebc20550421f781e628ae87980333cc9eb8f000000000e80000000020000200000000c457d7eda7f51e598d93d28d33fca9320659a5826e4352dd1a51b3be9dcf0c2200000003353573ad8a790c95018971912a21f2bafe002932be869a01061f95ddd934d474000000035ef3800926ea02f434dc6dde5465be140a6d3398a8618513dab843de24a100d1be3aa9ca87f0333e5b97b431d8487f0c99654789dca95b50f98d08650c0ddbb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428310346" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9023ff4ab8e0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000006faa5a6ccb8aacb8ffa708f093643ec56ecb96f14b3663ef65c8600cf3cf1d34000000000e8000000002000020000000914978981042aa85d269908eeccf843c66b342519dade0cbd72d85e35cc8a1059000000039ba29baaea8bb6825ac20fb5aa3f2ee80d63336685c93b1e84ff1994f94d0742747b6ed8b7d1d3cee4f9ad726ffba750eac96957545c56817651f5186a766ae46b76606d0209c326386eab87bdc8159f265b9c3dee90c78498491a8921936f6fd622c979e66e2ca011632315ca8f1da9dd75ba51fb4bc399717a32b98150855fbebfc9de02c9c6b4543d3869b9fb5b740000000aa08f99054e42789fc4d7d3924319dee39e5ba58bc43162b3aef4f18adb255205dfd93f84a98c4ef03a3056cfa1f22664490b79dcbd9216e23afd5bbceb7a27f iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1064 2084 iexplore.exe 30 PID 2084 wrote to memory of 1064 2084 iexplore.exe 30 PID 2084 wrote to memory of 1064 2084 iexplore.exe 30 PID 2084 wrote to memory of 1064 2084 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\764d3f0da9a4ae0f320519eb42a56092_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab5a7a5d104b98d359f3659526356589
SHA13552faa1ddb0decb6bb98836537fdb93f5da1554
SHA256d92d85c0ba6a21d4ce19d6e0ebee11e395600477fca6992a9e0f364b0713bf15
SHA51207c3a2f3d3074d52e37853ab46a17ccb8167c0e8f05d279baab3dcb028353fc1621f91144036f2bf58c657d5f5c84be22597d96e2a54c5fa4da55cf0ff3679a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54be39cc34ea5b542e1beba896218d412
SHA12a7bbc7f1d5157f2bd42a3bf839900ffb7e05b81
SHA2561385bd57695edcdc7179ca6a2cd4e5137b7499287a352010bdf7c83e8d64acaf
SHA5129668bfeef9c8d5d9c2bdf086cbd36e7d3c55b25b846fa429261dcbd39b97828906b207c5a09807997880b4ceb2119055c3910c5f07a1c1298f539bf469baece7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0533bf4762a19cc578edf1999d3fe26
SHA10f926ab1ad905fbe3edb99d7fcdb0ff10bb8504d
SHA256467ad8921f6a72ed2425f2862ffee5d1aef425967999cffb1becfc7c212b7753
SHA5128bff8348776d2bed830643a9ff19fb76bb6b9475f3350da3af129ac877e59401f35a41e71f7d2ea4c338f413f448041037cb94977fa86d48988634d4f6cfe9e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3c31668d1b67e02b61a1c5ca9ae39d9
SHA1f2da0b713c2f9c142e5a82f01039c305392ace76
SHA256287685e21fab81c1fcd831edfb40d44990916710787f2739f8b7456eba59b36f
SHA512e0fca596759f92ad9008a3cdf013f6a866b54cc01e2f096e10da7cb49c562dff6b29ec3c3d49feba33f70fcd0f86330a35e050d6a93a9e2acc38d5a0d88bf04d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0527e45d06d5f287246ef4c2f20efb1
SHA101d5166034cb7efcd64b3aa94ef068b55873d139
SHA2569ccc58617c512c72578e7de4cf6eab155176178bdb2b342963d9973f9e09d270
SHA512369b3b7d4c1d0ab4dee53ab45231860649e587b6796cc0db7106ca9a19cae28660baf424b1a5d576d75ce42d2d6dc5e18fb39f618f33c76222d9f97df361a447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b11604438068151f11ad3a8a29583afa
SHA112def7b228b7a7780ca399bad6c078961f4b11b5
SHA256339302c0ab70909e2115e7a444fdf5b911bff08041cb4f9bb54f326ea393949e
SHA512257bf73bf77fad5ff8bc8a3e9a285ce29f9e1c046757dc819e4f4746ec3dd3696c8324505ce1059b85d00e960903097dc6c90f25ffb2a65345f465adc0ce5adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b3605714e4893a62541111035fcd194
SHA137f553c676e53044cd98b6099df15185ee38cbb6
SHA256f8f86b6f0135a29d91315d230cccb7d86e8ff834240d2a62d5d362fb987c62df
SHA512ee0d8a833679bb8735d5f5ec012f607cbc561d7a844e415f889a368cdbf1c7348a3bad34c68febca446ff8a9fa5b76ea1e62ccee5a90134e51502dac1cecbdf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566c3c8ea762f57baef6b23392d461a44
SHA164ebbbbfb1dfe5b08da93f4b0235827c162017c3
SHA256a5236accbf0abbbe1cccecd6cdff86b56d4975806d9fba053c1622f932375452
SHA512ca2c1a448c4a03f1e07a8bff9a2798f6bf471fa5f52a92e4311c770913ce01d90f81e905cef73db4456b10d5d178619c153fff05887bd5abe3e870dc0b152670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b8e8a2259c04133fde2c4ffa9a4a3f0
SHA18f8243606441dadab034b15cf299fc71c8df1085
SHA2561365f8d420e28f66c436c927032c509bf614772f97d7eb1b12aa84bffe2524d0
SHA5121e79c55bcefd87f77519cb9bef9f2682d08f4d4300b4f07daea1b43c5047fd78975245b46aacd32ca54947b974f366b4269e9e5887674344a80a888ac8c179bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b2a215b9767883b9e424162edd0c540
SHA135eae99864b7918bbd06704bce769f2df8d2197e
SHA2568716458e183eeb20019b73dadcb009049ee94a827d18762418e07e6d4cb2b793
SHA5121ddfcc3cc0b0da877b73e44210c027ca1453fc86dc7d5fcc25953d7989e1ffba932c94a74747d4c0ea44ad04f5fb43c3711e6ac6ae86cbf665d74c19a66c3786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549d973b07c8e66f8254e068d6e516fbd
SHA1c7751f8860407d784f16a287e6f283e409e113d9
SHA25688fa2c1b1c57977836d3c7963b97d30c5291466bd7050cbde6118266b145fe49
SHA5129b35b067fcd4aea0d5e88b9015c8361d0e0867817a0502bbd83f0e91441e79621a7737f565907eb955d901dc11b280d8f8e3b17a9deda8d41bf55d3cc534faa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e037064f2728c6079b6049f2cfdfb09c
SHA18c452cff6fdfca9865e1fd8ff346f77e81cf7ddc
SHA25632d50ab9f4ab0a9971914824690f232c2f3fa0f67dfae466d1a809ca3159ee78
SHA5127091a689f563cf5df671fbdee6223efe5d86d70e7d4cc436d966d4892135e5426106c9ab0441ab94d2fcd4934da24d27bd6579e97eea332f407c689f96c4339b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544eb4fbcc972873648c8629bd2bbf33a
SHA1a5547f515916cc6698bfe889d3815dadbc829002
SHA256cf60701af277ed33327d4930314849784ab735a937b65f00b3219cb764e2a0ba
SHA5121c8db8771868703b8ef0c60cec3c3666bf90361df2ebf0d5a11748c9e1a9a2f256d5f710e1620c4f927b6f8185044124b1d53397dc37062d1bb76382f980be49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f613f7c48bc5e5a8e2eb9851958aca6d
SHA18aa44d2739080cdbe9dc39041adc9e7e105d7514
SHA256d593fa60d0af130d296742140672b9b2771b4c2e9594bea9ee3a39101882a289
SHA512b4e35b61d1a785c3c2844a3819100476413874be6ffe551a6bf8c2eddbd27158a4ebfe403395ac011832cd8f329e005bee47c3f92a3d3a4685942b712e1eae50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fff8df19e8ab8efc7739b32459562e71
SHA136d97dad14b2ee0adb8dfdaf39a92c33c432b17c
SHA256fb466d8cc027cc527d9677eacc03f037d0a170ec2aaaa4b1b2dd481db6375fd7
SHA512802e1e7985add73bc712b51ad9373a16948151cbbdc7ccda276168eef22dc09f65fd1363158f44991da2faeb415157f91dfdb1f1a0db9a068b9dea98e982f165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d64e6c4e5fef079cc2df55aca48b8db
SHA1d1922caf725b74e3b9f0ff9e52aecfa2127fe0b0
SHA256b2e2f789ec1ea5b3e571fcc15f52430a5c7d8f3dd63bc691a4d9d5717db57929
SHA512dad92cebe598bc7fd78cdd2fc2f1671c81eb80fd7dbf03720ebc4f0dc777148c5793a2e5949de93436438486a5be14c449c8647ed0d7d46c1dbb21876742648b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516bcdf1547ff7e5c6a66789f988d6d4a
SHA12a856cc432c42b816be3c924a54fdfca678f8293
SHA256e3366b482f30c03618c939a073db61d94044882a88e8e3c3e8df1a8497d5afbb
SHA5127fbc624f7473a3b5931a8713e943892ea2ab45c8aaafed45044586f9463941c3d9ab48319798e13c7c581fffadf2d43e366b58d7a9c76f3f9e5b6d401a0dd927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e349b077323f75e0e69b2a34aaae421
SHA1b68cd5f36405ac0f67208dd2d4b1f6590d9eaf7e
SHA2568c9499156e4bc509ae944d9e63aea6cce9506bfc91cf29c62a43be5e005b973a
SHA51212820a31aacda6b45a0322c4ae9029c15f85b410435fc3f02091b887af5c743ec701924318943cfaf475e890f7f1df318f21a0d155dc3e9f0b36c6e640a52995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5285fa112b594a786ba8c9b9bde8c5c0b
SHA1df227e5e7d212e84b55a9750d048bc2ac96be532
SHA25626464cc1f3c8fc0d89bedf3147bbed2828510d76e496c783bc4e748f942b8787
SHA512ae51b9a7821951e8959c05c3885ac590ca0559e246e131134745a98567428ddbd599aa8090644a0775b2908c9542fda4436c779e80b4b5796dfb3a35d6d73ab1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b