Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 15:26
Static task
static1
Behavioral task
behavioral1
Sample
cfd8f1ccb06a12e1a748ea2cc3308670_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfd8f1ccb06a12e1a748ea2cc3308670_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfd8f1ccb06a12e1a748ea2cc3308670_JaffaCakes118.html
-
Size
48KB
-
MD5
cfd8f1ccb06a12e1a748ea2cc3308670
-
SHA1
6598b3b8ca9daf964aa253b67d8684536a1a9d4e
-
SHA256
e538b8d455408657d2ca5c2124a6419477e776a751336d5b68b81bf5bdb8bdda
-
SHA512
9e7797a63d77cda7ff2995ec657861fb21b3e79f68eb7807885885c704467aebebed30c5148841fd5c311549583a68bcb71e2d7dbbfb42cfa1e571ea5fb29852
-
SSDEEP
768:V/Vt97Rycy2aWzkHa3Z3MUIBTSaemAELdjqckF8SC0/ZuOU:Ht97Rycy2TD3iLZSaemAELdjqck0b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000703af4eed6fe5db5d90fbc975e73a294a45a2d5a39f319a3e09471ac174f89cf000000000e80000000020000200000000d5d112d0bf942db841cb1d6a863fb8a6934d53de8468dcad5a50361b3429b7f20000000da849e389ef9a3b253f76b6eeee568a8de0a8f455b48c206f7b6f73c773865974000000063c7495065201e99f3426bfc8d6b04193abec5d5c68816538d037ba5aa94992166a5bf092e3e82e3fc540938fef34f45ad6385fab302016839f71a39fd207e0b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403a5a327100db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431798239" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5829AB71-6C64-11EF-97FC-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3052 iexplore.exe 3052 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2700 3052 iexplore.exe 31 PID 3052 wrote to memory of 2700 3052 iexplore.exe 31 PID 3052 wrote to memory of 2700 3052 iexplore.exe 31 PID 3052 wrote to memory of 2700 3052 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cfd8f1ccb06a12e1a748ea2cc3308670_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0ea0e6f32288ed3b41cd26a6da453d0
SHA135b74e7b4e12042691f9ac9eb69031d6fdd3710f
SHA256e095465f6e9ab4b1a66533771d84722881f66d8ac24a0df69533bdb59359cb6e
SHA512b71d94cd45cbab2fbce9be66942f8389fd6bf30de786149545b6e0bf04f27b9b1a0376e02975c1acf3bf9b99b4889b38e7292279761da104fdddaf1835eb4b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f43ab0ac0e453900b0508d4d8e9cd52
SHA18abac983f8730afd3681a1b66608bfa32732fa88
SHA256ba08d066b924b7a74eb0a7ec7ab416a02f684a7301fdb4fc96fcedae3839e587
SHA5121255183aaca0cf15e3c1e8ed743a9195d6d16509f463c56d5510cb5e3fb9925e6d15ac013e2a59dc53940b70445d68ecd366e6049c25cb6e479b9b9ffe6c6be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5305633d451c00de5b36d56256b13f4cb
SHA1b6865765c63fbe019d06bc26f951b833c5685e4a
SHA256ed11ac87f9f0ec6a191d63dffb7be6d6fceef44373acbee751bfc573a5b4cec5
SHA5122c1238bec29b9104f29cfe19fcf0c3fa79713ba709ab47559453bafa69cf04c4797bce54611252e7ebcfc185ebd4cfb2b63e9615ff9437b75de31787f9c77a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53761cc34c3384f650985b98afdfa674c
SHA1a11dfe392fd81eed3ebee65f5027f89fac2e8846
SHA25644e17b4b1774caebef7b6ef71ab9ab05c682fe6bc881c8b780ddb05d9de2f136
SHA512e87167d344677d729ca4417c0952c7939cb02856791bdd08b11974ca9e3686222f6dbc175b3c52477daf563a9416351c239fc9479738842dfb9a40c61cc30adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5399792f8ef221022c2eccabc07a2c1d1
SHA1a4ae65a2ca7f7fd10ea45c19a9ccb64e2bdf4028
SHA256b0842c5d59f0040a0272a90d1ace4680e11b37ec04a9c1d9edb374e3bcc25f89
SHA512dbe565278ab8180e1c237dc2f13f04f208c28c40746816ab848b3241f67ee248b22fc03043928cfb737b65c6a52048ec32b15eb3ec33e83848e9e89cd1a2cb07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a01aaf3df9f6f2625ad648aacdfdaef
SHA183e3c300d156ad4b8ea5655776ff67ce4cdd668c
SHA256f1cda1129b917acbb6f9bc6b61487417f4a16cf2172f4eabe993c4333c492a95
SHA512e22484851867db4020d0a6e010143f000152761ee3b2f437a0b6fc1e70ac3024d2d2db0b6b32510e61e9771b549d265707cb81bbef803eedf206e976faa4996f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6dfa5950932533009b293f320860c0e
SHA15b68a2a393e5ec5c70d628b71ab106bd1fc80d4b
SHA256fdb1d657406126ad229100f9db4d5cd14754f3ac73b78bdb575061888222a775
SHA512994ddc4ed58d234a0ada83731edd4f0f7e173601da53097aaa2e050f2d7a33010be0c2195be756123ffa6dbad47f61ec7e0f30fba9e349a8506614f4eb39dbc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bea9687e15d90f962ac2f5dad2426c3d
SHA1ea4cf263db8f1d2032a9d40a9c1e1e76ab2bc611
SHA256904c2fca2f9a782aece665690b9f9a0f2bc733722863be2d8ade260eae2c39d5
SHA51272e7fab11b93ddeb4274e097f990053494e6a0a5e573c455e18b6020bc32dda122076f3cef5f2a6201bde5e4e55cec64f73f55eeccee9f7d3748324819bcde68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2dba8b84a4e52c99da6eb99c5e9f879
SHA110e70493aa1a76015cfe0b95a0f320f9e524104d
SHA256129dba4520a0b381b787c54b6b713b9efe0c0ead16f8d912bff49cc5ad3c2e93
SHA512f234a09da02deb969c31aa523435cae49916b9aa5d356967c3ef5bb6e1177eeadf16d0ef19b5f8df9e5fd3c45d8c26f53c6e57efd0868ef37dc9f15d2006ddef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e570bb1e536ca011e99f14f7790053b3
SHA18d219ebc0d4f0a46a5fff5254b0be44757e0021d
SHA256a0b3223ecdaab155fc7772c71863dd939f31c4222ab5fd4668e465d44b057e2f
SHA512d4be8b79fd4fa0d37604222ae7d6960b55c52ff8d8110b98dcd56f4cc2b22091bb9ec98ae7738ba0f8a7d78befa281ee3295ccdd385ad74963fae3265e550c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2dcad2736313bc816e77785f2abbfac
SHA11bb97745a71f928b7fa394400e9bf99a642b2238
SHA256f6f92a46d98cca037bf5a9179f111eda801d979b769b76dae1a3ec407ddc010d
SHA512ad1d54c67720eb49bc1c3dc4a059538bad004b05a19ddc51fd980d64e137ba25d75e2a4c983c957495c31f53bc8029061c32f85d3aee347d4bba91ea1f301f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54530782d378b24a2e20ee1025532a995
SHA12da2d654fe98702e8bcf7dc787a2ed372a17bcb7
SHA2565a942deef21db39d96151be27d0f3d3d6ceefe69dffdb5d600abf1454c47e182
SHA512217d43f7ad36d92e4dd931dbd94e882aec6008fcbeb4f0c55f251ed787d963524632915fef03c5031f012a51492be451ab63f72b653422d699f683ac39f8db87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597cd3da263faa29dfcd1be5a05d9ebe7
SHA1f0ffabcc07ad8e2dbcc51ef415b33d75fbccb03c
SHA256fc35851d9a72e81077399f32b6aece8fce99b9123033f4642811bd8c37e0401a
SHA512e52532771b4d5ccde392aec5b21d7a56b601671895132bd04125c059cc56c38d890bfc82b0ddc29d502af23523c2ab384eb44db3547c215a8eecb17ebb5c5b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b707fde22b8e98f9def8f6cc2584b9f1
SHA10aff4648a8cfbfc0d7b5687daff6c16ae23730bf
SHA256c7c1b104984b0c2952326c408d2085a1b67a573985e6767c10245ec023a47ad4
SHA512d083b9a004d71d60515073c010371c20b25d56273caa91fd61b75e70ebd3d2fcbc14044fd253292638f4d1dd487acb3dbc0ab5368ccebfc8b1e31abfafabf8e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581e04aed768f647a803bfb2d0e0ee3b3
SHA166994bd6b059efc11eb8be9e2cdc21138e90e025
SHA256d9fb1dc4f4e182b658dcdd72be9b3752d9d9f82b66259df6e16baf873d2431c0
SHA512c0d2462e1612f69fb91655a96738e77f6618d654e1077359a98d68063ea4e59df766cd845f2208969b0ce9fbc6e59c8d4c877886776fbeca693fb8cb73a82923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50087a2746edc2395fa4e388608958f5b
SHA148f9d0b4477010e35ceb2ce7043fae4917277772
SHA25692cf0cf45a79827b7e5c8a9c9aefd47f440dc0e7c1e2457a53f56e447210a8a5
SHA512af1ece0c6a7b2b5cc60a02602b779ee8810a614763fecc86e6d0fdf1dcfbb3cb32defd09daa5ad8a477f93d2fa4ce1b529fb9b0deedb3ea9c2095ab7023a71d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5013caa701628efbb4a888126563a7564
SHA1845f375551b1a99ddf00e0f23de434a7a95e3c10
SHA256f43e761db289db9fb1255c6fc03dec4ecaccf17dbcb728bc429791d61c905622
SHA5125c968b751829bf5f4d8cab891bdedae2558dfc3a30224bc38d5c8a3401146bdc7a212a9d6b1be2a0422b25c80a3c40e528a4b42642fc5ac6c16f54d616c79b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e796a154a32eab9e5370e20d6b73f47
SHA13517c52c8f70d62f5490dd3305facb102153781b
SHA2564cce2e60a69f02cbd07fb5429c5f1c42852858f4fa628a2357c11c65780d6acb
SHA512603a40a247868e1834bd4bdbb9d98e41a0a9f544fa40d69ec76fea228f437f07f2115af6c8784ceecdb1f3bac279170934d7c5cc58df104a6ee848e0d89b697d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5982772041aeda1f2eb719885ee946840
SHA1594d3de31cd3c28d01932cd701f0d63cb363f064
SHA25606bba0598bcdb44e5b7e54863d5d31f8f672b6e0a4cc5cc9d21de621447765b9
SHA512395ba74685d96d83d6a3bbdd1f6477d2bfb90cc77902ca1a22c298cc47a40f08031dc5bdb285056cfd6b66717b24850b1456a67dfaf90b7edd60a6322f7b0ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5011f7a559001ad143ea4a126ee197d50
SHA1a9b92f7d9794139b69bb129f9a01d77d0cb3605c
SHA2561280c51c34b0bac2de2aac65ee88c73179efdac7c9a414cba91a83b9d8d84621
SHA5129f89f314f451ca36e8e62e1e937853fbd5639c6c96c16c544c2b22e580da739cc1b91ab53fbf3e05ab0c1c3ec99eb4c9a6e231b122124b0f900e22980fdf08d2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0I0VVMWQ\iframe_api[2].js
Filesize993B
MD5611a3c12dc0550b080b7ac4b834e93fc
SHA10102462db36d3653517e5d1e44c378bbbe88c577
SHA25662d46bd19914a6662719761126830278933d1c7ef0dcac88e81ad9175af487bf
SHA51273b0c2d8153d558b8b4287dc2b3481b5a6fd524e5a63168908bb522f5ac0d3104b00ce551de318d6621f68854b384e33001ed613abe575cccaa4f690ddad481e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b