Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 15:19
Static task
static1
Behavioral task
behavioral1
Sample
d23c899f552092c405a9687682dc7c32_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d23c899f552092c405a9687682dc7c32_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d23c899f552092c405a9687682dc7c32_JaffaCakes118.html
-
Size
125KB
-
MD5
d23c899f552092c405a9687682dc7c32
-
SHA1
a740799d338b355548c08e4ac1bc1a86f085032d
-
SHA256
93183e15c9b7189b53dd1015db5a6540dc2d751a61bc22e6160036700e1f26df
-
SHA512
844e44a09cf8e78e572cb5c6f12089c41f9811cb4c5a301c060ec1ae33ec3010b5650c209a2e28663e4935732ba3ff78224a5c127674625b0cea64dd55afed9f
-
SSDEEP
1536:STmWqFfzEBL3HGHahWlBaWabzjqji+1+I:STmWIzEBtWhabzy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431884259" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D0F7FD1-6D2C-11EF-9E0F-4E18907FF899} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1864 iexplore.exe 1864 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2300 1864 iexplore.exe 30 PID 1864 wrote to memory of 2300 1864 iexplore.exe 30 PID 1864 wrote to memory of 2300 1864 iexplore.exe 30 PID 1864 wrote to memory of 2300 1864 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d23c899f552092c405a9687682dc7c32_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1864 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504B
MD5411f6176ecd93728d10f58193d1294bb
SHA1593ad44175eea0abc41a89bf93da53fcdd1bd841
SHA2564be1df755d8af82aa2a0392687cc253fb5320f08168a2aa0a132cfb55f97a091
SHA512d381ada562bc43fd330bd59a11bb7dbd62ce1bf45646aba74e08d2080a420380896c5183c3763794c481528c4ac11294aad61c79a5682d07b8f6ccaf067cdbdb
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\009D68ABDCAD1E408129E3B70F670221
Filesize546B
MD590ca568ae96ed14d61dc4fd946a91e47
SHA1d0a8cb6f04f9a3640d7886f2ddccf03a3f73a172
SHA2566dbbe11e6fe3212dbd3a370db401aa423cbc6bafcaa9913f44f93fddc96c26c5
SHA512c7de1962def6794a84c71219e27b22cb6d96e30e8abc3812299a36bf04d759c5bd2af6833cc8e83c065b9cb3359905591627550fec0758fbe4a063e2c1762481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f43d5e87060017db8a594b2b18031f1b
SHA11391e685b0044cd190dc21edf648d6ef18a1e31e
SHA25688b110c3ec38ae253e9a0b65309cd269c5adfc7bb14a4023d638809b83c60e31
SHA512417ab3791b83bb9e87e7d492c6562c19e4c4c60255e1e8c17f0446dcc09a3bb73194bf7b3561f5985cf0a0b959c4e71f10b1cb4959290e80116a0dfb8fa22da3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5448d7304634ce1572e03c65a4c5c63ae
SHA1567bc41c52b9b2b53d8bf694612019afe99cef2a
SHA256724d59381e8d556da686ff280cb558aa4747f7d37960628f8d291956a3e15eae
SHA512d04772d69d5f20e0d99de513fcc355d29602234e8702db4930f6d4a390639a77ccc268dc5b2ff17e7b56660e28f8767bc45103020c214d9191a5c83d862d2b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5773d9e42be71cb4e2c65ff489990d292
SHA10d0e6f43b8f3d61d6895325a24b2c079d1c23094
SHA2563bc3f6163bede334e671a81eabd5588831cb96315b7d0601953cf76b84b861ce
SHA512d182ce837bf076e74ad2be8c92c2e3afbd990c2860eb3628087f1ee1adafb99214830e6d330e271269afb1dbac674d0c0b71e76a3915ed96eee4a775bf8f3e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb18c6fdd48791513ae1e493e186cb27
SHA15fbfadaab2c023a6d3d369e525ef97c35be78a5e
SHA25668bdea600c33737e014c11559b9c9db69bd9761e8f7b5b354861648518226e51
SHA512a3ff25ac0cb998ee932e1906af221d04e03f11569e02857c1d273f4e0c9d1de23ac958bea179806875ed51c270d2683225944b547ba9ba334a2b62b51209fc9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5491119915e39fda0ee7c6fb171da53bf
SHA1252beb54052512daadeaa2b4509601dea9a172bf
SHA2564156a2decd8369d293e3fab663d33e76d58a186c19d86dde50edfc8621546f04
SHA512367c95e3bd64eea6090fd863fd9b581b809727e592cf9113ef5848456dc2643b8875f21a8541afae71f24d944cee2350cca41767fcc3a8fc80fc0418ef23484b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ae6bb7f9cbbf6ddaad99925e3776ac
SHA197e532347318e3eb6163e4b974c818a09a4fda24
SHA256f8614e6028429c774038416f9f2649e715026160940b19742172841ddda84418
SHA512da34589c8f70218d560191afa9a33303a13d22fde482b7487321eee635701720a0c92513e394656a9381ee1fa47109001f6599f3e9c85ef104496035b0126d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b812087cfaa21e74e6e43900a96fc641
SHA1f0437cf035a908fd2cc4aff13cebb16ab62e4d2e
SHA256b0f94f5f5f99133e94c119ff61e73ad7dcc13893b905d3f8894dd64679afb5a9
SHA512cb29cdd33101660b1deccdd185912fdd302ed7264a44ee151b423e13b2bb322ca67f2a19de2de8f2330b551976747c4c79b2c9fb90f495572cd951269f1a1ee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c9aa213184e9c969773f76169ad2b20
SHA1186524a9f9607ccb3c40d215c75dfeb68e4aee08
SHA256d435902370a9be809fc27b32df78887f983baff3329ab6e507f0d3ab64ab5581
SHA5125fb3631c89abd25dfc94d4678ce300c5977422dde67184486b812c4ccde11409e9ece0b1ac6fdc1a496a2cecf1cab5cae799a8175ce9ed502e9d7d5a7823b4fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f8d5f3a1ab2f94ea6062da372334f7a
SHA11bfa053ebbc258ebae9970b8fe103cee28194e89
SHA25686622f31f2893edeeeeffdf619e8ca8935822e523df6b73466e10e306262c504
SHA5122e0940155d2d74d400b8931807f9dffd65b1397f830eb491d4ec2fb2d489d2ac41d78cde3ad90ff3c9c098873e25c60d169feacad5e30e667d771cf5d34fbf37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55de2c324316d239405a9a8bf0fc2f368
SHA1da0ccd0563d4eedbae8b308bead17bdf579aad72
SHA256a942cf06e4367b417b0e84b6ce132fa6f1b79b3ac735c585c5eb31158b706207
SHA5120ab17fe442fc67e9eb62790afc69d4b9f1c1afb04c947f02ba909ab52c15461b83bba3626f9191abf5ca0fc6e3a2066f77e1af0c8715efea466a28d92078e06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9979e335a821bf12b5520bb48c702c6
SHA1b4fe1791395a63fcdbb7f2162e72db73823673a9
SHA25651260b602c8d9885d48683b5d38a570224c0f90cb4ffa5b78dea9fbcf9df185d
SHA512d370aeb17f0fe56e016447f662302b4076f01e65add5d554bcb8faf6a276edc2668b0026158718e7961ee773017180ad14da2e2bc275acf912269f254c01a475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5396383d66d795ca2369878b938368537
SHA14e798241d5093581bf0a221f404d9c997b7ce944
SHA2561caf45188a992a7f9dfbf61ff5e5b3d0a132fb773af39e0be2e45def11ec1db8
SHA5123b8810c29d237d95607bf96a7d23bf59e97a4d02b5b558ee78c3e6812f97faa660378b878dac520c90396a8b58e5f96d341609827ecc3d229d670ffdeba61ca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509ac9cc436bdfda6f14a56dc17fe7072
SHA1c17833ca42625b28ecf5f885607434febb145111
SHA2561c9c56327d6ad715b076bdfd8f181feeca30e2740ce28d62cea17f68f8d3c06d
SHA5128432496807adeebb01beda34a85a15940590c311b6a46e2de672c25d8f20cac802d0254a722af0dccbf8f22c2bd74f79e3bbc948ca6c9e8ad95ce8eaccf71948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2ef6fa953fa2c2cdb1905a70385f366
SHA1b2849555f616ede62a5c76cfaf2b78f54fe4d889
SHA256dc89e9bd945d922474276ee730b15f88dd1ce48f87be8b9cd024d0a94b31d95a
SHA512c270849a386fbc648b6d2805ba9ffdac0eda20b490269ef0daf2b11f1844f99ff3eb737a98fe3751f021924dc0ddfb437a046e5c73e89e65e2c46cdc5105ea36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532460e801aa42bfd3c97f1b5d010a5fc
SHA1e7f7d5abf77c48b57cf25d91f2cf871d913606c7
SHA2563075d1930b95ab200c098ce5a488ae62555cb2007109ecb40a1a56090bed7cc9
SHA5127ac55a0fdd268ed0c0861c4a72881f93e376f0968f196b19cdc1367fa6c2e98375aea3622271714ff118a3bc8575e68974cd79fb5688a29a1d20f0ae5f9e16d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549850137e82585853f0ea71bb82aed5c
SHA1ba510bc9122b45d5e72846b95636e1d721e05b80
SHA256f92c6b9d974a92ac2f667786cd8875d0eab7483f9d30425096d921c0d9da7cb0
SHA51250a993021a2c83ea050acadc88ffea10e743e6fbc7e18b6aeb45b3773bb91d786fe8a08243f44b9fe4595c271a4d458a84b9f84bbf6a26e5a1fdefbaaa038b8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9a044a233199d371b9c834f71e31507
SHA1e5bce6b3a734c5a9436478b79efa9eb81f6091bc
SHA2569cb822479a14266e866e369f99c5ca8b44e7de6dc415018be643036389a20cad
SHA512e6e3e2430c4b3f137e594f0614dbf1bb2e27711fdba627e5e55b2ea10acfc276677f53996ea07da6f4c46cc01bb0c7046046edd4088a139a1c2a8333f2c98f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527ee21c18c53d390c14899b4505cb849
SHA17acaaef4fa32a9c4aec7fe10a65144958ed5bb56
SHA25644751c3372eac12d82d8eeaf5ea750a48038af394620b85c3bcba6f8e0eff6f1
SHA512a43fd098cd62798146a3596fc1bbdcef313d2664c1467bba98e2b5876aac4bca503d191b9e2ba831a2338276b84cdc0469b6f901cbf2efcfc89020f921b17614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3c9ef917d0f57a3eb7cc077e8c103f0
SHA164829122633c521be5c09df8f00a37cc3a07c3cc
SHA2565d22879af23346ddd8ce9ff93ed114ac623027b92159821e092730e172899d52
SHA5121e4e991547046b30cf4e063fd2fd581ffa805bf70b6ddc8dea8267c0c9d20727a88af8cbb7a39c1961d1000a72225eff820eff794cd4834e13a71bca34c85a80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59160c0ead278ccdca0a964a8cf341541
SHA113fb395f532b9d3521ce7a5fe9f0dca69d0b5348
SHA2563e87ef5fea6ba84ddc1a42914b0cd5230ddbe69f9e4d0ea02d810b59f4733966
SHA512aed42872f15642d9e9163f7bb350a7899d20dd448a99607f4e0af06cbd60765d38ee7c63cea2527456cce654dfbff76c223e545482f4682328a5ab65b51cc593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD519b25647e923b336a15357041d4575bd
SHA13cc9217891708eedc0cedaf939c389ae13b5db96
SHA256f734c4b1116d044d48e1ca60546657f929d6909536d613f2e93751cc916d1b2b
SHA51209baad917bcf19a061bf7ddaec1212308f1ee88dceb99acd2f875d7b0de4134f36d823aa772be0284ccfe0ee32cb8ba6ad5b465913abe614dded3f725b497568
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4RXRX1VH\lg[1].gif
Filesize43B
MD5b4491705564909da7f9eaf749dbbfbb1
SHA1279315d507855c6a4351e1e2c2f39dd9cd2fccd8
SHA2564e0705327480ad2323cb03d9c450ffcae4a98bf3a5382fa0c7882145ed620e49
SHA512b8d82d64ec656c63570b82215564929adad167e61643fd72283b94f3e448ef8ab0ad42202f3537a0da89960bbdc69498608fc6ec89502c6c338b6226c8bf5e14
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b