Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 16:03
Static task
static1
Behavioral task
behavioral1
Sample
b45f4d7694a271593170fd750433b71e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b45f4d7694a271593170fd750433b71e_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b45f4d7694a271593170fd750433b71e_JaffaCakes118.html
-
Size
14KB
-
MD5
b45f4d7694a271593170fd750433b71e
-
SHA1
7eb3d401c2012d6c671deccf576f0ecf82d6c79f
-
SHA256
6b86b21b60932312cc3bfe8875c68ab8aeb23e2be3bd672a6f07e3bbc247d518
-
SHA512
00737cf7a043cd3d4851f98a29ac208e5b5d17bf64af23e74e865d31e718035bfd95f49716a71c9ef5e28f457e13a13fb22fa0618067c5f16002adb8e1e464cf
-
SSDEEP
384:kLz2dAG3BxfAPcUf061LOyHYTp6U3bFfVX26tesgAYiKNYFtP:kLafih061LOyHYFT5VZedAYNYf
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e00fa4db0a1fb48bd700a94904cb5ed00000000020000000000106600000001000020000000a6964073421e70c239fd6acdad6be11ec009eb5218c3ecd6d3f66f4b8d3513a7000000000e8000000002000020000000e01c5346efe17f6182924eece0fc497b99d271673071c510fc4aba0f7b36fc7f90000000cdd8c299c87f7473df963fc3e82c60e0b6747a24ea681f5b93907749ed010d78b23b0b27a8ec28c46c8151d7f0dc307eb0282e71d4a7b0e14ce813ee85b53232c28a6443287fd0bfa9429429219b9d956d111699f732f8263b93be37540bff14bdbd9261a1c0298b71b4c2bc8441efa2643cbcf6213564a2e8f78e69616409929b4c2543d5a2338cc10c1b0c02935578400000000c2680e2f38f64d65ebd8c2d96f3cbfd6b545b9e699ad597e0a0e173ef4bf38b07891f24093990169a20b5f8f13acca80d4995eafdf005f74fcfb0da9bd6fa14 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424715696" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{043262A1-2BFA-11EF-9FEE-EA42E82B8F01} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e00fa4db0a1fb48bd700a94904cb5ed00000000020000000000106600000001000020000000e5ad7eb7ae20caaf04298de96f2d62c17a1fab780ccf1bbbe3a709ca66e1340b000000000e80000000020000200000004d3ea2fb49d8b7486081b5c96cc2bcc8c09795d245433fca41f9a3a65ac67a972000000070992b026215d780b9d36c4c81c1a904089b4ef72384499521dfc76ad261e92440000000b864a9af3315f67af75350f80b2213128655755629e1e792e942ccefe9024774f2e82d12658ca14a732d0808cbba21f2832fa33d613d10eb1b517aac89368b37 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90fca6d806c0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2908 iexplore.exe 2908 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2908 wrote to memory of 3024 2908 iexplore.exe 28 PID 2908 wrote to memory of 3024 2908 iexplore.exe 28 PID 2908 wrote to memory of 3024 2908 iexplore.exe 28 PID 2908 wrote to memory of 3024 2908 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b45f4d7694a271593170fd750433b71e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ad69fd1129acd41ba491ec310a41496
SHA151c15fa9791b5864c2a5d8d973d99c7cd71e15d0
SHA25628fda331fc0eeaa306d483a890417f806e15847cffcd7bc1fdeb674c9dafa981
SHA512075a44cc4e8ac19d12b6be2d5874ab92bd75249afdfe609ca8096df2bad2ddc8d395e6ea2886ecc16ddf9b1dc1c5df958c77bab3a6496dced52e40633b5dc2ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc6de637e862bc167e250b12ab2d1acc
SHA11cb3cb871f8eb9cf6ef2a2ca0aa37fbc809f0e85
SHA256e1a1c8588166c6910f99c96b5ef6abc40ffd7d1b187bff534d1b1d2209e1d6b6
SHA5129d74aedfc0de5e5c8242201a9990e2fecb49eaa1107855aaee8f7baa6ec1806f5c32e25545b524ec9764750e1e0d7905f5c893599428d50866bd550614bb64c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b28b177e19a8bee6597aa04928d8d32f
SHA170550120f300f5f51005a4bdd0f7e0fe299abb08
SHA256a2040856d796f6925dff6d6ee2cbf398891ec09177b5788f757c6a33dcff76d5
SHA51223764f3f8775d3ce050892190790f895033171a929d5b114d56d2dc10e48702085d9d8d79d1e2ca94908f614f69c999893f918f905794933261945235d55f9be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532ce56801469a4f1b5025f8896973191
SHA115f65a0de66b5ab6ec2cd0b471ed9f909b444163
SHA256c9ad11091bb6a9106ffff956347fa803c81c416cc23caa82afacc5edf8e7cb5b
SHA512461c7e8b31b8b1823b66e876b6dc0204723e0daeea90ce850c522e109e90b7fd6468f92738036b12dde571e42794f8515ac7efd37d94219ba15a33b4032a1a45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a95483ec0460f4a2466f25fea5e62b9
SHA1b7bc74556015a76feb91907e7771723fd1766259
SHA256641b79094503b77af512b9e0e48f249bb56592fb0f1d2c1bf5e1a94162d88ba6
SHA512e5bbb41623cc9978b4a80438f4494011e5a1727845d95a80d4a6d57b54b294beaa1d070b69fc36f20d464b92e6a67d488d926f9839ae2607c0c179aedb49e5b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b8b077a34a758224a68d2c7d6526fc0
SHA11a84458db0a11624f343d80b3df3e4bb031d3e72
SHA256d71230e9a0fe2970685fa3e2589f1afe8ecc550eca5350762663a8c0bcca274b
SHA51229fd9fb9696ea615a39072498d222be897be1eb992bcc739eb2af0854cd9edde240e4359b1ac7544e3ce65e39097f34eda7f32fe40dbf23288f3f5a4e64f11c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c35cab61da20a8d384acedcd5638961
SHA1a3491ad49fe4bf65c28f3935a8ba4d58cffb876c
SHA25656b361041a4656dda9bbf1f6710ae420c8758957b3516ce07c4ebcca1f1a5ed4
SHA5120b8d528d640a3adb0816f5aa47be1ae3ad96c8022d3dcad540a483b7b5a2eeb42453ca8be0de0730716326881b6d8af185f3e9d2dc69c0ee209a09bd781c2b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b08465619810d9627dbb40913315c26
SHA19479c194c260a40e85d93b3a911cc01310cfec7b
SHA25636701a2ac0f4a6564c93463e8b15093feb1605a9d940c27658cd531d31c06642
SHA512f8c19f873d798a895cf2dc40834a25e1f04505adb58a12830082da6bcdb4a3b8968789d1e058e044781934d5640632812d2f3c7d5672fd7881ba79532c35b530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3bac014dc8c38ff43d3e91baee68876
SHA1095c6b143e4fdac4b9fee3d72c066619e4daee26
SHA256e7aa832ad4aace891fd4dbff3c3fff2c41f72c266e8817a9a0e57535bcea1eaf
SHA5123db95e80f8ad29cc9a85d8495db1f5f737ceef97f64c0842e9ac6dff01b4a36352635be96b9bcceaf5c36d3937d9ecfcc38d6cceb571d48ce47404e587b1b37c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d33ccf78472588c25121876e47251f2c
SHA1e04948fce2bb414b0ea56ea029f75625e8e3430f
SHA256a1a3e3cdf1135711a5c587aefbe306454c3acf0afd2bc9c0e5462fc669f27ef6
SHA5126d46ddd908416392249935f55cd5c2a68d9b621999e2f6d4f8edbc53be82990885e658fbc9a0a4464961a3d93c86d1fc537f1daf2b06690f38de1e0c2dca138b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550d50ced36f0735f92d88d6757a930eb
SHA1d5e0b89fd398c6375a8e718a1dad8e2bacfd69a2
SHA256e66ad057cb63b701ac2189728163f78b4813dfb3fd0c83e53a359c5cab7dd134
SHA51216f6c28047527c4e3e2edd8d263e93653086a82ccbad249709bfba8a4b4c2b316a29e77a3b6f25fdaba19e2d4a610457bde994531c0e5ec6bf247dda99135e37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf6a457ea25aad7c285937e465728679
SHA1ebdfc275abc1fa475675d020f5c2e41542ed6111
SHA256d7ff15b2a320e597e3c7d480734534d201d73aeabe9f1f811793631dd4d87a2d
SHA512775b1794ce52c2594356a7b2254e3d7532c86c03499c44623088eefcb8725d216a349303d814c951c9c6402882acab8f3433340e08436fa35785d152124cde1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5686e7113df0785537b5d26b6764c53ff
SHA1405ed3a2af78a899c68a2289d01353e15b9c727b
SHA2563345c3e4530e9fdae7070f73873df0dbcadddbfb4f6610cd3a2a11edf1dfbef8
SHA512ac9742db9eb07f6dc5dce7470f04d8905ef705ef6e26910f81ec9798f7dd5a6036f59d559924f2aa569ba4bc263c96a96f91a4061d7d56942f07e482f1d95610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0ed842de377a34efce4e55e4ba618ca
SHA11aea28c3a06e4b6420ff88336cdf5fff9acf07a3
SHA256ba168163fc8965dd21ce64930ce77eef46f1f3d58a634bfba5591ae862f7b743
SHA51285912f256ba1f26523b2c6391c5466b8f1eb331fe84154ac2af91bc61502e004d39028bf8c13d710f4c2a26d4b8badf4107822cc7f0cf56aeaee3c3e4b488d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5f7118ae0413f00436f0ff6d3ec4d83
SHA16c7991cc10c0492ef08777f296272a3665b44c07
SHA256b17a611eabe238d49df522c5b48ecb292f09c503504e8b9dc64fee6ff40f6580
SHA512f0aaccf6591bb8766be9fa177e49f6c130abcee7854035e881bd1b50c839bab355114612ecfbe3027215257eddc72621e5dd68d3e0ae95c9da1d3fe613090694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a69722743c8446455423d7b99c61636
SHA190a36dd02b254753a01aeda805867aa4a6f82a26
SHA25658180bbb0fda9e73cd36db11e17af2bb588c989173737ce221030daddd9321a7
SHA512431ad5d3ff0a679bb85847c986f3f14b8e511fe6554bc58e8b161c73ca8bab27c959267e42c9de0dab0338341c34daa145c94ed10febd69fd32ca7607a910960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519961f29696450649e81cd8cd62d47a7
SHA182182221df9a3aa020ea4c8d78038bf08a24d547
SHA2566d379df6aa6e6843ef3a4401dae9e954385250433b91a6f626c59b841314fb66
SHA51251b1a695acae1f5093b33b8384e504c4c104510e5a124b5a8b21c9a97dc1d8c22a34139e2943761dfdbce92a2b0f8ca13ca977d260bf6772cec8346e8c06e0a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5820da791ab999215bca4c007c59143d0
SHA1ef9b7b8957113b15bc2b95bc4b9eda24a5044e66
SHA256c9376a7a6005498c3b43ea968c64d62bd33b10d40a5682d67fe4c486b76a1a3f
SHA512b73c32bc09278b41a734f3d7ae7e22603e6befc40e371c46e5600615703528b20de3677c9b3c0d81650863c7e93c55a51fe6604870e192b881f2289f9d4c9745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ff27bce96d005fcce5d972f87481238
SHA17fff1569cfa5a39c6676ff81965a0fb165edfc56
SHA256d0de543e5d7d2abfd26f0adb1eff2449aad49549eb5c01e8c215163614a62fbd
SHA51219802a986201ee7fa55523ef8a01bec35e592b1f254c76c1d4872920ff4dccfb88402dcc2cef40c81705056ac884f5e70720abc5e99af641248d9368cdbf8485
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b