Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 08:03
Static task
static1
Behavioral task
behavioral1
Sample
cf113f82c9b61068fdd8e49717feb593_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf113f82c9b61068fdd8e49717feb593_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf113f82c9b61068fdd8e49717feb593_JaffaCakes118.html
-
Size
461KB
-
MD5
cf113f82c9b61068fdd8e49717feb593
-
SHA1
6dab890c2bddbfee4a9f672363d3fe63d9ad6cbd
-
SHA256
ca4cb5172ad2d47a14f8cfbf9d51914ecfc62c270c5480e5e41eaf7ec6f7aa80
-
SHA512
b2377638c694e9e3b5933a87631c8426fd150f0c6377f91a34950f0a83461c38c0df7d63540b2e691fece562d9716661fa3af6f36e1fec62c6ea0d7d5e675402
-
SSDEEP
6144:SzsMYod+X3oI+YZzbUuQOsMYod+X3oI+YVsMYod+X3oI+YLsMYod+X3oI+YQ:g5d+X3r5d+X3j5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601726613300db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431771687" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{871B48A1-6C26-11EF-A7C1-EA7747D117E6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000045c933fd2177e29e826ab34c0ab0595a743c6c2b00f9bc0ba486e768cb238427000000000e8000000002000020000000906b152cb04df8271ee45e63f736bf266d1b55dbcbef192a62c4882db7c6d2c990000000503eb52ba21df49d671ac222427adc4c3775cbe9e005e250061859f586b151151571f3444158f4bfc20809454077e26615f4d74c6ac3445821493feb1df0bb1327c7cfae57ff1ce5a1c05dadf404b026c2df9c79b5ebee4eed6bbacaafcba260dd6db3baed709e8741fe20fe66c5b522308173ad53129be01764bf9098c34750cfedc6d8bcfc61b524a61d303427fae640000000598496142636c880473f3a3a4a85489fbbcef9cc675571eab729b72fd8f730090fc7880baf6638639eb5e898083b4f02962bfacbaf34eaaaed10a363fea05f46 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000002d0c9d6692de2dc8e28281029d0464dd6950575d941da7eae528e9087775fe67000000000e80000000020000200000009122b774bbf2ca2b887d178ed53d3b488ad2f46396d8d420af30c04abfb953c62000000064decbd82e26b9bdd6e82f85a7dcf4c568057fc94e4880342e59524887a912e940000000884125959409b33cae5e88add6c28cb4b382d50ca02494c87516a79f056e4bac60a65bf6d7308c1fa749492c63fb82e2639cbaae31c906d0b81de573c743abb0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2540 2520 iexplore.exe 30 PID 2520 wrote to memory of 2540 2520 iexplore.exe 30 PID 2520 wrote to memory of 2540 2520 iexplore.exe 30 PID 2520 wrote to memory of 2540 2520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf113f82c9b61068fdd8e49717feb593_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa71ad6b53d8ee7e4fc6dc70a8e66193
SHA1b41fc6154e9622f3e55c91eccd4656e96e2808eb
SHA25631a3d912c57ade352d0cb0a0676a8403cf830bbdc53b8623a96e3cdfc5579ac4
SHA51246100561028ebbcf173e5917b86be61972b9cdfe4ca8e6b7a22de7831bbe3e75a75054a87eeb4a880bbb5a2097e3b4ca53101828251697fc3aa23f04e3005adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5785dd2a05aad32d46a73b0b25a53a43e
SHA195c405af1a9720a340972df5f49b7d6f93433cdb
SHA2565b59d7026fbb1aca8454f2484f05251aba53783a33aa2e040a65b1919d9c3c87
SHA5125cc7e11de0eca61fcb2c88a967ac36c3a26a03ddb93f82da472adf0de400d63824cc4b95c4ecc77fa03abcf2371dfc098f291653a8a1847708031c1126ae477f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eea9a2ad7bc8714c534b93731df687e2
SHA14e37921d0acab1d795ccaaba84d211cb1a523606
SHA256c5ad3e13ff65708a5dfd637f897d600933c985c7c39346857dc40fc063313aba
SHA51277c7fcb62d7aa8d282667789d84d4eef54d9e54c1aa8c49aee7cef327b16cbbede2ee818f82c16ace006f43defe339875bac53a9e97cde9a3bc3ec8efe3a7ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aebc035141cbe1362e85e1401390d48
SHA126182a67431cdb4665c58dae80bd724afc56d990
SHA2568b4c3186efe3946c790c9d9fb31b12fb601df6eecc948ca32de12d104bb2664d
SHA512c17a4ade651de9060053df999dc25fa955c062620a993b776424bd1636cb373cce1e0e4cfe66e22d62918788d19022ac634601bdf16ddb1dcb5de14f6b697727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b12c07ff480b30ff13081094c947c6dd
SHA139f0543d48187678d2f8e5719f95879fc28c2c14
SHA2569b38e90a75d1a06346e6f7587421d1d9656b0a82437adfec5b739fed85abbc98
SHA512f1fbb543e7c225ca77e112f5f51a2c2344448bbcd77faf1e5d9bfe4da658ceaf60717bab5576107e2130b6379a35117108ff75d4e6640496c57759ad75cfb0e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57309ee12f4a1fa96491668db6bc2a224
SHA14d947dcb9fff5e225ae982065e450919ef882e0b
SHA2568a8a6463c8c980f597dfbc675f493abcb6337420e26690f95d438294ed5ed45f
SHA5124944e1b3f9aa8750abcba920461800cd982b61dede82a3730d86038446ed249bd92eacb7e84e5511ca3042ace605c11d7691eb872c2eefe157283deb81f67e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b27d23be6c55730e3a12f1543e255f73
SHA1d00406cb8a9d0127e09025ccd23aa9a73718bcbc
SHA2565c4336619b702b3ce2aea60d21cc32cbcab2b255796f9a5a061b83a43b6f7c46
SHA5129c049f3ef083c700ab5f812bcbd82777e6bc9cc1afc6e35bdcaa382c172e16e6d93a20470c3e9c28ad3eaee000ba396c307525931ac3cb84f1948bd0daf633ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8287f14305ebd57533b60c5bc60d2b8
SHA1fdfcb3b92c2cb925084e0b7687232dd0d43b30ef
SHA2567ba405c76ad30c2078c57edd07b4425a5fbe0d5523ed6ca1e89bf668701fd41b
SHA51281133b55999663c67a5f72dc1f331119a7608722cedd05b9e5c53f752287883173f0f7d92a9cbdc23031dc58344f1a59a3453b606808c089d4ba7358463e166c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536a92eed74edac99e5cdb1b754eaa2ba
SHA102e81a39b2ed8994c1edc7b52fdf500a9a123400
SHA256ae01ca1cb8623934af89b0389b0bb9603547b58a150edd9697fc6df0d0880f9b
SHA512fb31a559fe56205e6ca640fe53906e782fd072d214359a54b778d1b0b63eec1e43d7560f3677759d181a5dd5946361f6eb482e4d6aae945a13acf88f2e141b85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed1147e649331472ae674d0f0491e527
SHA1a792bb61c2a9d7c8fb33f8c4b951ca05b186fedf
SHA256a954b934cae5be91f7a414e61ca0f4d673e8e5c4ff9a57a3c589e77291ab4d08
SHA5121ab246d4aef01ba1ee32e63bf4e994ef5d8f8094791dbc3044c87f8c3ea8097044e0f26b59300b7cca660c4949efbb43a7c01aa69aa9bb9eb8f67847497fb2dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f687062a826ccca8b37b8e9ab3b630d
SHA1100cd53ef4ee80ec9eb516fc9753f94aa0e998d1
SHA25626ab53ee3e54bdcfa90ea9ffa03d9b750129288c2f386bf9c8cc5118887fb0b2
SHA512a989a2c5e64bfa5e16beaef05b17b84626e6dda660558b12d621f4437818f72e7812a3caff6755a893c80b9041dd243208f7cf91f719636c9b5b019fd58fd3af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506f297d09785db797347caccd14913d6
SHA1ec9cfb4043e325d963a81095fb83208bc1bf4485
SHA2564324544b593a957823110ba1c09d544c42d5270a41bb4bdd14adfe450f427b52
SHA512f7a846afad326e378acd0c385d8b8c52bbc2ab5cbb1d8ce684101e31a8f90ad8676ec608451dece0336029862df409a8853fc589ce331d1c8d8ee20186344d78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b369eb91d6252efca3844052269968ab
SHA1ab1ea11b741a89bc755ddfaf9d25bc9883980af6
SHA25692695282dfe24898388f4478f5a13ec1d8ea4c124e086813270be3a00c0dfc02
SHA51256db03e58c4ec20ded24596744b54bf5834be1ef0bd55ccb651e5cd3539a48157069767272619ff7b0e845a9b21849b904729d3e6fc882341b1242bd1c7121fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c82ccaf0c4249425e3dcf8b98512d2b
SHA18b9786b631f61769303e76f3e7230b4f9d86ae64
SHA25603ea9b36eb0b524734acdd866ca46a5d13574e705bd83ca639aa12e87b08c33d
SHA5126da296d02a55661f908a08281feed5b0e40a7ce84912a384a4955de55b6b29212fd84609b926c871ad802ab7963fee6fc03753529e91f520841054e702fa4ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2b8e1f4706b949f32a198e8640978fd
SHA1a88add48331eb09a9d9ac8c15384477ecc82a018
SHA25664f7a8dfa1aa1b25bde254013cd04f15f3542e6677c064e1a861e8866bf66367
SHA5129870f19f9a76b8eedc203a51c9b0305e3e93de65f88c580430a808ed4a0de520cfddf7781b98868aecb3990608b281a780d62eeda5675af712fab5887ebbe08e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52136a3eccc2f14ef1ad9723d1ce55bf1
SHA19ec8e2eea52a429e09ce45bf3b9f49753e0404b0
SHA256c2f79d1ab7e8610a6c62d8d761d85b5b467b84689b9a8b342ac1f926d520995f
SHA512eedaac0cd8c40964b6b37ac7852215e89f3bd085d9b1bea540d7f0eb3df800b218d45a56df24fe3cd6468daf96a01a0bb46b65d4bbf8e7fc41ca7e3793d9fa15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f75afc08f05e1817aa15a8cebad7ba30
SHA1156c20d51a165ff26ae4ea0779dcf4d1af829c50
SHA25697f6e5067936585fe14dd4006d0486d06f5f2837ec8b8b6af97bab15b5d1774e
SHA512272071848c54b4e08d6633dcbd2ae55be4947c446a690330a6848e24ae3c88c0ba7c8a026ccde27e75eaac6e119e1a71e4f2cecc676773d7e3c37aaa995e163b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a470d83d010d0d6d15c0f3d8c4632df
SHA153119e1bcd1aae0ef3e10556b300e1de41a10b5a
SHA25655787ca05a7e22422b3ab1d8fe6a4b8b46067ad01e7260bb7379f4b6238ede55
SHA51207fde33e33f96a8b507e481d1419ac26452620510bf9ea8a23fd91208008a595ab13648713bfea266e89111d10057b12dde0e968aeac6719ed88e8e3401cb0f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7e1ac6457756e2e793d958317d5e9b4
SHA1b4f7fe8288b91c939e64d904930e700b7b9ca5a9
SHA2564c7f42148400c0069e0d32311944c1544a818b0f618a8dab1a410a0fa3ca97de
SHA512c67af3da177ce9a1c85a6c5c379bcb0fc01703fa551399bab7a4d0873728a00ebe661c8b7bc2604b98b5b3b3511b7ec0e31e3fbf58afec9b16674526706076ff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b