Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 10:15
Static task
static1
Behavioral task
behavioral1
Sample
a22684dec704ad47525dba875a29b116_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a22684dec704ad47525dba875a29b116_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a22684dec704ad47525dba875a29b116_JaffaCakes118.html
-
Size
17KB
-
MD5
a22684dec704ad47525dba875a29b116
-
SHA1
0df64f36d694630505f3e286a3cc20f22adcca0e
-
SHA256
bbbc08bee976e3cff45da7aa63123f3d76c57706b8f82f1095be75cf8ff70711
-
SHA512
eca0656d4dd9d728acc66cc790889786109f7a23de75205c900a0c2ffcd90183966919888a143489a1d4cb16e4a97bb98bceb694e9927d66add6a0e464539b16
-
SSDEEP
384:qWN0j+QjpJLVLLLLBUXs8jyGndereTUXs8jyGndereN:I+Xs8jy6Irecs8jy6IreN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000983084955921121aea640a073b659c36da6c114dd9c0c7a94430f099671f0dfd000000000e8000000002000020000000b0d6236d453d03415ccdc5ae8aa00bfe6741c9fecd59240b0f7af7a1cee61d4d20000000463eb46f107997a44a65737bf9ee42bf1a151309a3cb8fb4453e22cb2b6709ae400000001b30be591ffeebf2278b5f3e7de7d72eea4dc362e4f3f46b9339bbf351f9143f5bc479f6c2969b142bd1dff48a97a1d77f66b782b088b2e0d5aac03e9efe159f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430051616" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ef6f818ef0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000dc28d7f164d19c47cb4d8a9884a49c9e5b0588c6d88648c2eebc1a8aa5d75dc4000000000e800000000200002000000017c497175194b4727a97c20d225f546486601caafc923fbbca58c36f79bcf6fc9000000012556f9fe6f00d0492ea775a6357b4b8122d010ebda66d897740eeb2c4ffa2f662cca52c436ca4dec879f653842e4417cc76ae5542c0e67b9b18b345c3e2018542a5c6105b43dcf4b296fcd86008ff04d3360b19fe5477f7b345651a7f4741e5efbfe541a20ba571a3286dd5166fa5f2027fbd0baf34b4930513b2693d7fcb8333961ae26b4f06e39729d43b3b4a161d40000000088738f5ca9cea329eead028295ac9cf4594cfd23eecfbae5e4ffc44022815fe33ab5f7078c2115b53a4012888e3c90692d1a58ef29bf6a446847ef741ae3517 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ACE3CE91-5C81-11EF-A1FD-CAD9DE6C860B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2448 2096 iexplore.exe 31 PID 2096 wrote to memory of 2448 2096 iexplore.exe 31 PID 2096 wrote to memory of 2448 2096 iexplore.exe 31 PID 2096 wrote to memory of 2448 2096 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a22684dec704ad47525dba875a29b116_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec5722b1a2c1e2ccec95a9d502f25e1c
SHA1680b8ea7c2ba5f4e5081fafe7d16cccd3362e2a2
SHA2561e9ef93ded8c6cc8e7937d2ddb04d3f5d82b0985026d17dc09b8b267a78731e0
SHA51207efd4dd17fd0cdcb640c4a149cdc0cc55ebf85aef9b2372a9859e317c0f074fb8805ddb38d32ca5bb28e3eb7921c16dc5e6a8efaf3fbcce84ac6d1e53c852b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b4fdd2612eba38075fa8a1e6bb5a4c1
SHA1ca871dd714ce2dec253e543661cadc88252ea808
SHA2563993e4e802d081d6a185ae4e832ffd3b3ecbff0881df53876476c979c01188c3
SHA512fcf529ed40ac5ef6d66f38db488b1297a18d24f18163f5e1cc7acf173a2b90b2bc8ba5b571aa91cb1f2bd26de2896f72f1782a39bda8fd972f261d1fbac85f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505b4ba46242c9029bdd429ff9b983384
SHA1e083ae862675534d2a12262f287530723bb02a39
SHA256f2ea98d7c218f08e800d7b81f887f19b0d02b9ae4fecfca1b27c4bdc8f6e052f
SHA512070aa95c00c2b6c69b0ca887dcf247a246f6cf07f2738b489aa5888561595246dfc65b75a64c57cd9c31c031d8c9da6f088c2f5b2c2af0d88258409b97cc33a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5790632a1d6dbdc834afa5f0b5238855c
SHA15f973687124de9d32984a13e10c8767c2173977d
SHA256ad040c2d4b572a35633a6aa3a66b9dc3f731a43cd162b123d8c4fb9608be147d
SHA512248485009442d77f31ef9b8592a713e36f11aba30aeeef4d22d5f89c17fc3c95aecbcf6ba788f5feb7e7fc0822bdb7d8470e4366ba70a0bc75758a40aa5451db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5996eb50f5fd0bc74b4675695930d1ac0
SHA164220c3690b1d41e2302f7be488c88a74d334976
SHA256c447d41596dfead5b86ed38228b1115cc7bcd1d61c8b524e332bcc19fc1ec7f7
SHA51299a4c6c06ad78ecdd22ef07ca56766a08a03ea711c08959cf532ec5a6f765bc5a9e09f74230c720a3a9a866ac3816894784110a5e0b9e9ccd875f5def16010ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5998aa0a021e9fcc6e76dea08304c2019
SHA1b4984e4539047afdbbf33c74fd653b393666bda1
SHA25609774e7415de73b9d69f719faf4d722f9aff3c1d889df15d1d3b96e7dcd23670
SHA51268a6552d736de38857e0f8843f8ef80d15267f777804f081d37d48e62d64ddfbb4a8239fd945735a2308840ff89bbba4c0480f8dd57191d4523a7c9f7e34bc2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f160a5f4a04b02bb8947edf8d889d4b
SHA1e9b0a4c5f984ac34602f91217a31f735b7891ed0
SHA25680b339bd37a9cd587fc8653fdf13af7e1e24c1d777959b0c78123a360664b115
SHA5123d3a4ac559ea91e1e7330b940a7c200a79be74d7cc188142ae8f4cb8ede9359e571ee116f85b853ce7f1f691ab7b7cba25333d240355d6cf89641fd3c2080472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0fb72ca05fe4b5a2cee43ccae915947
SHA1ef6fbc2318ac7e6395b3bcb62bbdf737fde74295
SHA2562685633b3d9668b08af6289a31ff1202231a81b3b07c029eb90b42c25c11ddd7
SHA512b12e19f028902199990a05664143756830f6e1bb1144df9a98d0a9f5610f491b1db2cd862a2ddb8949aec20123e3ba393e050c8061d449c12b299e8b0c9d2cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c81776846ec7419b6278556f88dbcc
SHA1c7553d839a9f2a8f0dded6a997727d9d2d373e3c
SHA2560539897eab9fcfef5e52b09083492ba3f9dc68815143064bc9f70c6e8bc7082d
SHA512d2e4ccbb56d7edcad4e3e4280f06847ab7290325e8b56046e4e2d313b477557d70226d3c21247137eb0c78724fc9d2126ea3dbeacc6e933c2f6cc9117345bb1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed07ec74dbf384a44714f7c975caf442
SHA18165f927b09e19cfe590a871c98e5ffbe584c6f1
SHA256472e7f286ebc60e8c1c33ab17f3b1f572277ff65bc79bbf4f499ced610a02fb2
SHA51251bc271da76cb685282a68c9e3ef66f85a5d8601830f11343065f12d834412a4738484ff3e8a2adfce9bd611720a880053de3fcfe7d7fe97c6bb01821a5485cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfc74852a2d6341133f25289c918af7a
SHA1811c8a602dd7098b203087a7c58b6c18e3e4e48d
SHA256028fb7d955e8dd043b89852c31fe8d27f76dfa53b308ce2afe06ff2536966fcf
SHA51219674cb35e998071a9d00954387021780b6d06ddf2f5c7e413e23bf84bdaf86f2f3f6b3a8add933ce4e29ed702e6365bcf4f9499d3137addd7a9d09ebc746541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0cdfde27fff51a35f0503088b896d33
SHA14a2e5b1341259a4cfb10eb1b5c103f0d51cf6c00
SHA25664d1e551fdf77d73d7c1a2b8adbcb1084644e892135b8cf1e9e4fce3708fd185
SHA512481643143e39a3e8fdbd7aeb96a17c6a8024abe506bd379c83b8b7bc31d96d4d028cda7c3314b4eb16e81a4e523e86020d1876f121f3122b726fcd06d1d9e3b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6aa861725d8116a7193214c53434ea
SHA18f00671a5ba8ac0d3705d41d495d48a96df26bec
SHA25604c90120442016630b597494a5486ea34df0553ebb80a90688f0ad16c5474e84
SHA5124e814499a202d56d26a08e29cf1b8f0bc5bb0547011bd6d1c69a62e1fa600fce2912165fb8320612f4f64ef6f21e00b5dd2b73e474b0526a613d12e2c7be5cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542d97dcfb0331b5fbe1793f789680fbf
SHA19f0a4e2604c28839e032e90c1b3032a66eb6029d
SHA256c23eebbf7e5b4dea865e7b8dc187d9d3b34d489600637b4fc80f16e91fe28b7f
SHA5125a4fdc8cd0d8c7681a8910477d62739f6a650460de7733ca7c05f24c25130abf8efd59ad70691e892def81b8e16134b143b3e5dc9a235f0fe527e1b2565c7ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55608c7fbf183d3900aed3f591eeb0abe
SHA137e08c133db4acc1da721887d1906806531d43ef
SHA256c4155219d9f00201c5b41d9cb4868e9c30d7bf59a09629ceece11037f25c2842
SHA5127d0f5ce19145dcfc9baa049f7c4c1c85a1e7ee86108119465d66348d4ff4adc2c1acd2e49ebf8fa2c53894cca656144cca25e543c2e27704dcee4348608d537f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5159721ae05d715363969bad8867cefc0
SHA1b714eea623c7703800aac299acf8c678d0576cb7
SHA256e73f2dd76e951f87dd33ee3e797d3012fbbc1cb70d752c5165b6815d949e1f8c
SHA5129b00d34022c8082899e5b88fa03efc83f4e1af4ab526e2567a49a32dce24b634ca109dac62e4727623d70793e33ac4eedbd2873c4dd64d110dfa857eebba9c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e592366eab466ba065cbe1eeb4743a6e
SHA1603fb6d258317a0818e878ed54afb86a2ac23b20
SHA256758baa1df7ad6e731e9335f8bc2a42084fdb39327884b7c9c1f60c5fef2375f3
SHA512409a190a6364b1677eb6a87d6f5c28b5a0f0a6747a80a6e538c57ef0f54075223aa4b843ec346966fbfa5aa173f3efb3bda7f99678246e7adb56f7853ab7cb31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573ecb494ba1ac3fd69955e681a6be028
SHA199db96787c780278d01a64c8c5721cf9530640d0
SHA256b0f6048f4654a537dbdeb8fdd62d626d65c796825433fa0a071cf1b83186fec3
SHA512cc0401277845baf48a1d3c5ed3b86dc8cb757cccdab9fc03bab81fef6b19305c0915887dbad0199b39eb4d6be13453a593e8b70204448845bd374a0a758421ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dd8e5b60e73082f3d0773408b9b8054
SHA1ad8678fcba50158ca5dc79f0eb973c4d4eb8abd8
SHA25602c2612d7fc4c4313ccb6814d5fb3d4d4a2dd04bdca0df8f8cf3e7937bb285f1
SHA51260e25db86baa3474eb842df6cf7a4434709cbb2a24f90ed3bf246eb086684f8f1a89393e7e60631730a232d4e7d1c49d73839a2b5291399b9e5df00e6e6485d3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b