Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 09:43
Static task
static1
Behavioral task
behavioral1
Sample
de28182099290f94257a1c31fc16d069_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
de28182099290f94257a1c31fc16d069_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de28182099290f94257a1c31fc16d069_JaffaCakes118.html
-
Size
139KB
-
MD5
de28182099290f94257a1c31fc16d069
-
SHA1
2fa907cbd7f4f84bfe0c12f514c7a693d54d1a73
-
SHA256
b8b606ffd10011e182138ac578bc8f99cd3a66e7480c1082e5bae573b58ab1ae
-
SHA512
4f800de58acc8bf9d9d1f8a292ecc74d4f167f89eba111b9730baa1fc87875c017d3f2ec9ddb943327a73a7d90b873a86d0a06578e070a3e70a41299301084ff
-
SSDEEP
1536:Si1VwdjAuGhl3slBKyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:SigjLGL3yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432382467" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000049a0fc7195b697b70faa8f7677c7d7e1a48ad878f4580c332ca0163a51e73dde000000000e8000000002000020000000b535d7079073e417e61385d75e7004e86da759d3e5d32a8caa7b18435446fb75200000006e01b37949c8f4862202f1d51b8bc428c41e87f8a746b87db9a4f917ca3de8584000000061272df4538a4d9305db75833a76323c3aea142987dd0728c81c34caff8fa4da3b95b8bd284dde2ae7b69f334d43cebacecf7c99381ec12aa56501eee1b6bb0f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4093edb3c105db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9BC18651-71B4-11EF-B961-D22B03723C32} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 388 iexplore.exe 388 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 388 wrote to memory of 2440 388 iexplore.exe 31 PID 388 wrote to memory of 2440 388 iexplore.exe 31 PID 388 wrote to memory of 2440 388 iexplore.exe 31 PID 388 wrote to memory of 2440 388 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de28182099290f94257a1c31fc16d069_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5765245cd06b7f4e0691b6ba9bf8e56b6
SHA101e9db794204df1b27d3207f9ab4b50de7ff8aed
SHA256c2cc130e6b221b47c82b5bf28b035d1d35c34574267680702e159a604fda9f13
SHA51231b89addaacf871ed3cb9e1e5a9673142b755c45f9bf32c1e4f8c0db8b3ec04fdb79933fd1c47dcfec554009b3b09cf04a450c9653e11c5e849f820f8db0c30b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5489853252b5c39b5b2f6d5d40e6ad753
SHA1ee05493dfe67e916583512b2b2a9e0fbe2fe23c3
SHA2561b478ae3124d5cb8d3c315adc4dd337b5dc6ff90c549f88a2ea7de26ebc13d72
SHA512be2db6e954c597d79e0d2547255b62a3f1a3c7f1fbf9f2587bedff59715d4e42d016f0bf84b07228ca54b3a260bc98784b12aba4bb3f1b4587cac55f3c9c0e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8fc414f7efe5beb8542b5b0a2894aee
SHA14fb88980eb13a3ef7d7b746bdf6975fd0bd695b0
SHA256b846604b09b0cd391669316e7b411fcff60ff57575d53076a7c9ed656a66992f
SHA512721c0bbecc4ef6a29f57b84f7bb5e391d9525743b19a6ac2aa6056ad9c2b6cf95a6a2ad0a0fc5e07098ef5d6722facf7539658d99bdf2b6429ed5287588e9b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ed59c854077c77e0ec6a412e538ca47
SHA1e095d6a66abaf65dad6d12df38116d5337ba79b0
SHA256fb7715afb221f48ee672154e5d74659f6ae485b9070eab1ae3545bb17f5f6df3
SHA5126a9469b2d9df9fd7af66ca49778c9bf00e6486bdf37738dc49d58c759cf06cb92c1eac2fe323ffaffed34b58ff0f0490d2712e6eec8fbf87af18decf337ca539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5336a81793bc127e714da82b28dbd565c
SHA191e36d0ccd47d940751ca209fbfdc779aa1954ad
SHA256ab3353b344dfbfda8f1c4c39e58d49f1545e05064297b9e02a6cb36be5d58f7a
SHA512cf98749bc0f860088bb0a9c0197b909e75ba7eed57499da125583ada0d53903f570158a1b91b10f3031e578c0de497a7f054fb24408436a9b9a02352cb55ac66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a387027236e9ae49c968316b8f2c7b77
SHA19fe5b26d9436e4358a5f9fe4eb965e3f99e72814
SHA25698d91be33f393c69fd928885f67170a8a492f769668ee04c198d0795cfd99865
SHA512594d7e793ad48d6d1ba0ac68fb99f9cb04cc7785f375eaaf55e6ed41bb159317d8ce83ed0d204d48692ec2ee09b00dd48c87389a827a73ac6903ebb48f2242ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a24310aa629d80c2a1008c04888b85f
SHA1255f4b591fa885214c2d4bb17861fc57c7fb373b
SHA256b3ae0405d9608d20f962de5cd71a217d05fcb16f7f87982b85d88a18967778d1
SHA512a708b868a7af64c2c9808b58f681442bd88bb90c046e71a6081b94e4607bc8d37187eba8b954370db3985e83a857f7fee54a9cad909b74bb75f80f2122f3ec28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e01142da48cb6ac1c25bc1fa69858c9c
SHA136f9fb8774e7baa3bcd8d02599846a847eee0d79
SHA2561d870175e7e6c1b38dbffd3551efd5c84e539f1184949d18360629f1f5c3a5e4
SHA512f6686712a003991a011d5072a8a7661f3fbf62a749c572084875d63298b4e97e80a99f0648cc21da7f5ea527f9fd13beafa0df024b327d5aad58cdc8eacdf44e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561806696813388fcbdb73368e6382aad
SHA16aa472f42b97850b11f624362b810962e14e7478
SHA2566686e552f603b581c28cb03584d04aad22f60eb709fb35269ef6ef57cebde2d7
SHA512cd841f4356a314e3ad34808ba1445b27bc0be34f32594a5f8255ce9051ea1e860ecc63c4beb8ac9f599c989e215701acbb5775447c551321c780215609512539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5846fcc7c5140c6ce8d7b0076910e9acf
SHA121614414ea1b7f95ccacd335bc87b4ede49e0ea2
SHA256ed6108e8017e3d45174e68ee9aa243a73e82eaeee504cf6317367cd347bf0891
SHA512fb08636055039b304de6c2fc74c7865c8b1a3a45e56895da23bb26bbc38db98c6ef85c5f907d06c6af30ee992e9b1df5252c77d5bdfcd25ca51babc89b9a4f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a5c11a823538c02ba6279639887093c
SHA181c888fb06216f65a5c10c81ab90a2fe687101ac
SHA2568143c4ccd83e216507c57daaab06ac43b2f09fae917797946a49c4eb0866a777
SHA512023a1ce800162f6df2bbd254bea3f240f333c8b552d41c6035550729222ea9639fe7bb63a502c81f23650ca08f06803ed3f1415a085a6545d3331768da47a7b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577dde424509f6444f42d49ab90d107b6
SHA10c01cf0d6639dfa0d4ef58c000fa5bf26e6ddba5
SHA25611635e463b827d38f2f628d68cdb8f7a810a455170c7121059203b22d7661c40
SHA51223997cb449219a7936136c53b9b0c3c774cf7a74eba9ad5cacb3fcdf5a272449382dd6a4fcd1df0176ae7493e339c06d950031166ef2f388baccab8678f2865b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5776007923f21a3e1f7ae648afa09a3b8
SHA1283e2d4017d20be28a773e1c7228410a3ba3c688
SHA256a8f7bc594d77c87ad4e179ff7e9429ea2360325316d93ff87e5dce4c61988e28
SHA512a9107a6643f9308a276646c31c2366e208cd0f7b34958c682480b181aa32e2dcbb4dc1cb2e482e8451f490abd00968f679e6bffcd1a0f1b836113932643fbd59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534b7a1238defe2537279f5a4704fadf2
SHA175307a768a8d4a4b75b6ff550e3d7a0161943e1f
SHA25650dc83afe432589c69135f38fc85ff8a2f3c84bfd1740dc718aebe2410c3a182
SHA51209d3fb18750cf89555d3d9f389144fa7da88adf3e16208c749667326dcda8445b3dfa15b1339f150cd2138a8eee58818ff1658182b91bcc8b1bbc029cbf5754d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d541c203d91bfc73b7eb8f44da061d8
SHA1ea0e810b5b0f29307401d057e6feb0a92c164916
SHA256a1a1c43fe073ccbd6600728987f87ba1d3302bb53acc669409fdad3c1404f109
SHA512fb3dda754b0b8e2980a69c7ca0d216eefb41fb652ec9034a53d818fb651c3d8f6eeb5ef376b1f025df07387d3625ed7635a3c865bf33b5b8f9fea4f9698b1c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590b9bbfd023590f2186130f9545d7c46
SHA13b831a36cd20c774254203c6f24068f1161df832
SHA2566e0bc148877155f6e365959a7e170b90d70da2fa464d7f8e431876854d15f423
SHA512fa218ff6c7ba61d674268d51058a127a930071e177b2b324fbf739441388cd774394183245f3cc9a3d1949cd916acfe85eaa1fa7f0dee6389032d0b5553d022a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c31828c22f6dd2d2230bf99f654314e6
SHA152de93359c1d1c8c6d9a21624c107cbdc44209fa
SHA2561e5f940181f9e5867d10b23c4ef23654e226668b2a3b5a334bd69c383589fda9
SHA512fd1a668034aece229a79b3f5f97c82798afb78ed01308e2450110e319453edfc9b34739a52dd71d90098cecc830e2e23e9d522752e822cb61711763d1f36f10e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50465f630b2ec66938baf230ea6a29eb7
SHA12a5a2cb71dd8effe51c44541453d2d19b762a1cf
SHA2560b815fbdeb55705c895abb20d91547fcca8f9f16b98650aba335ef5299ae670c
SHA51266c17e70f5ae487a641a1c002ea542fc3fbfa717a7a84dadf6fb7bfb63c8aa53114472767a4c5b2ea9c35b91a2bf95eb5b91cef9ae6d7b2923339fe5a46e60ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53710271a00796bc9e9b844efe96919aa
SHA12b59ceb0a7bda5769b48ce4c286f34cb17a5c971
SHA2563c084d06e04b5ac1d1be14994dfbd9c37ce18037ead47e38e153a9bf1349ac3a
SHA512dc1c2e1b0c62672b1c9b1b8ed87554cb36f8320c201766a122ccd0e612267402ab430d2238fda5a6edec6c15cf159ef5ef9dbc70df052f192807edcf2cbedf28
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b