Analysis
-
max time kernel
135s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
16943664edbb1dce3d055f0f8aaa1b54_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16943664edbb1dce3d055f0f8aaa1b54_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
16943664edbb1dce3d055f0f8aaa1b54_JaffaCakes118.html
-
Size
91KB
-
MD5
16943664edbb1dce3d055f0f8aaa1b54
-
SHA1
ac3b82fbdc682aa89eb373990a0dee0bc1c6f583
-
SHA256
647c3ff3d9bbf1ad7f3ee27b300fe203a62d555ef9a36c78ed7cefc86c66fb1d
-
SHA512
5b457281087d701e44c662d96ec03dbf048c2b4f7202c5ba9649de4c5383655cb0c170e89bcc27454e327848a32cdc9abba189da7f7e62a235366b1327de0cb9
-
SSDEEP
1536:MqL1/qtXGt0+t8wA+AZbhlv8M3yltF21uOmYtApnNvRxUcA+htl:MICtX3dxbp11l+nN0cv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c920241aa28d9646a61a84a4300b9b3100000000020000000000106600000001000020000000878522e3470ee89fd9d6e241f69753dc104f93013a09805f2766b4636ae7fe62000000000e8000000002000020000000dd02eb8b4006855db339f5e0c8eba50ebfa538c6e20e6cb66116030024e7de7820000000cff77d3cea51269059c2a139f28d81a2d3e3e41776dc09d5ba7a5c2ea65a6bb640000000f73afa9cb1b9a31ece528c57d400888979cab698fde2968fb2178aa6bc4285a419669c8b12cf46b7000fc33d7f1e2969ebe01343d0a1cee98e8a9a021b40a2d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{81727071-349C-11EF-8356-E61A8C993A67} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425665095" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f055b051a9c8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2952 iexplore.exe 2952 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2112 2952 iexplore.exe 28 PID 2952 wrote to memory of 2112 2952 iexplore.exe 28 PID 2952 wrote to memory of 2112 2952 iexplore.exe 28 PID 2952 wrote to memory of 2112 2952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\16943664edbb1dce3d055f0f8aaa1b54_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD58bf61a5f2bc4866fca1653d80e1db17a
SHA1e80343c29630bf229635636adcba3cb4f8ac24d6
SHA256f7ce7ebc8cdb0e960d2a43bdc0f3644f7ac320aeb24b5867c9affc08f405098a
SHA512f4cc55640fe30ac7686862294f581b2977dccc7264ba3e3e10cdd0c2e5e976d76e686d73f80f6b2823781e0e57eea9532e3273a249b32385d3c8f2183d9f9271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592fe49b228fb1b7d08608822fe467759
SHA1a33f0d1984690fc8be714ad006b8b3710135a8a9
SHA256f851e5b0a981d21bb4dc5a6dd59f04a9c17c15d5280f5d47dcc405aecf0869d7
SHA512a45359ca2138ae47863f043443b222df6bacd845d6ee33180ad6cd8a2c48964e8b393cd768ba8e7f05fa5506ac084cf54902efb23f9ea6ffc03b001f1ec321b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7c3ba976f7b2f09fb441efd1f25daa4
SHA1f14530889413e94e21bece1737b0aef139f8ba77
SHA256a0c6c1d80e7ef470667151528330b2a1fc3df9e322578074382247dd36267dae
SHA512ad43c16e3cf8026d91006f2242cd94d0e4c6aedd45f729209855ca1a424aa9718eadae86d0c3fc7ea7d0cf7375acd3fc8e30f1ec89bb8776a1502bed7db044cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f820266c40587b3eb17a0dfda3a89a6e
SHA1bb515012034c712211024aae76028eef4c4103f0
SHA2560e79d8c673f5ac6f486c1aa734f62ec7d72a6660f188d5c61e6ba75808b11174
SHA512062ad013464986271adf90bbe97593d8b5d193e60bc626d723ebe54c0004c275b5b107d7e52d98afa101a19bf314700a33134497e7fd5f934a1a563f10de971b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54216354687bf2be8eb59d6b258c99fa6
SHA17759b442da97e16f8154df570f5b072be479e306
SHA256dacb4e84f8534af59ec736e66e2c4db5cc82fbc76b5ac74ec5f0c265254a0cdb
SHA5125a0893c02bf1d621c5888e7397fbb76ea388008c65803895dc3036b328a931bb433c38e153eded4725016dbd28b4dcaee2fb4a0c1f50c1925a79edc869d249f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535195025e04ce64a8f99a0fb8c2250ad
SHA1a7d6fc5d7be7256fd1b7a1e91ab4329ca0353128
SHA2565356838b18941f77aac708165d75800ba136b482c685729c7158ff57ca578dab
SHA512429fc15e71f7fe84484e8ce417418c03a0f41abcfae8ecf12a3a50e73f660be3716be903879a8572dea19f5f749252a203b21832a2d63213121339253919abdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5933024575c990762bef8e9c9d06edf2f
SHA17c420e8b33b8a243f63c2917263db3e6634acb1c
SHA256d9ff3332006c9bbb5e523a158fd0844198330938034da16dc843f988e09ef180
SHA512ecc551a12650c968800bd12bde3cbc6769847305356676b4505dbca7c5bbdcfa27c69a9f670c8d2328172652fb3eaa7acc48cc2457df02fe353d4652aa170049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5650b590d3dbbb69fd1c833fcdaac9996
SHA16849f7801596a3833bd3cef3d6823bca03ea2a75
SHA256c8b7810596dec10bbf1e3a6a2db2d6de057a74d6ddf13d2aa0647426ca036f9d
SHA51210e6c0897d33607635df4d0e0f329f5f7a3f11b65bd75a1f17115c2e4577bb5386f8b8a027966504fc27307dd243cfd67e4183c87d03b4635aaef5a90da5170e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575197ba843fe8ddc3fcfbcbc79634334
SHA1dc7fad037a6e71c5e1eedc41c4ac2b83176f4371
SHA2568f03362d2079990291062b7c023710e06f627b8775d4e931100254acbed90108
SHA512fb3e8f3c411f5f38b70d511f6325deb2b78c99503448dbf5f81fb2344906cdb071a77d3d5084c269659a925bfce370185b71e4bf04a60e60114ceb9edc0a0e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e56bdaf1aa5bcb99c221985bcd58b45
SHA17e72f05ca496b149bf9c78f57d34c979180585d2
SHA256ebff4009b9d1c624cf435b10389f0a0ffeca4ef4c591041b0978277f43fcda23
SHA51294f8bd1323c0531b547aea3ae0fa4b1d995c72f5804e06143b71d0416aefbefbcd3988a6a1dc7989d66bf5f530bc029fd0742ae5dca3c6fc2aa76eaf1dda0b7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b1eb54eb873ff836cd6ae24e3a53cfb
SHA115e89296413ce68bf2982fce2edef24ba2ac2932
SHA256a26d7a4ba8b2d0c95fc9e02cdee8aa7348a1a0e9ab193624d03f3dd90359cee8
SHA5128581fdba1b2a7370524af148d1306f90309cca382e213b7af4b67975b464a42ff3819e1870a051b9ae28bd7f09aabe47d3867a3bc04f3597880421de027c7e4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a434179b0f5a420382b6423a380b1f28
SHA1f052e1157116a59e094eef14e4a89dc8b3b61209
SHA256bd9f7ad35f4bfebb39bc857f70449416708c4fa15396faecafdc64cdabebc0ba
SHA512c3432081466824c7a6d5d2477ed89b0dcc16ea35708b5ffd227535ee7d54c86015c703f030903f108ba8b770936fce3d9f0ae1416036b85362546deff9736cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b357aaf97b731e68363c653733e9e07a
SHA152da3e055f450efe579055322a081c94432636cb
SHA2566d951fda6af157e98c161fa5d77b6b242b16c44779c061859baf510a20b1b2be
SHA5125c2217200e0c263a10310642d43d02a4bded6b366482d6d8fccddbe06b7383bab6c1c0878956d4e5e542de3f4a0d867a83f9967e666a1fe54a4d0e1f9d2bee83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50091d94df378bfb6ae84d736bc8fd498
SHA111d4893dd23781ec3fe0afdfa65924388ffa06f2
SHA256191596b6985ed8bcff08e639b6beb89621aac783371429b44b72538286bf72fa
SHA512840bd9c97b6ed52f7b5c99056c85202c15bf712f0775400aa8149274ac3c0208707d01be32fe4adfd0511c8c8eb13998b83b8172920dbfba13cf8f6fd00f5f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6dfa803ba1916050a8cc5cbd756c9a3
SHA1ae4b29a4f409b3201b6334b87cd3d196535af680
SHA2568ed33eb19ba5b69b5a12eb36f8355337a5a89708cfee2e2a9e169c35363d56a3
SHA51283d4ccb81a70ad4c0c8539017a6361d804a0e4264ef78905b8c0f4dbd134807110da79504280cb7658dad046f9a82e29421ba898f1deaa6daf644c77e70178c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce331d642f6f045d853173ea06a8b7a7
SHA1daabf5609b67967576e43131472b2ad515647160
SHA25608b28814445a340c26f071d7da04fca1eb793bd4b2481773749f19460ad8097c
SHA512e1185ffd82ea8e06a323a21e3d44374121b24c87dc90d57dffcb07a03b503efa69f316dbe88d07b879f25bb7866ebc52779570459aff18bd61e81342f2bf409e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD52703477e9e2d0e25b1eb443b6c8f87ab
SHA1259f273b00b06088766ead6e41bfecf297eed53f
SHA2562a0c23b4faea825528a023375ea1eef4e6ec1f66f2774dab71e49ffb4dbb6267
SHA5128d4ee4ee140570759da68df139e1645b3e4edf561a91e012dc1f63e12279180adba1d24689ed5b59686893af64be466cac9d364b410a8d0e3af733c550f67168
-
Filesize
5KB
MD58015da01b380c6608a1d563b44fc86b3
SHA14741e0e61625dba62e38175ddbe55d3995f8027f
SHA256c7b8cea0007cd76fee446fb2c2bca2b674c80ed276538f573c1935a677e95330
SHA512006b739fa0ad7667eb9c385099a459d2157d901ac7e885211a96ae8795de4b6f81261967348cd86b092824d8f55dfb47fa388e24576d19f39dcb191d6b3aa475
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5OCCPTL4\favicon[2].ico
Filesize5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b