Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
2d642d0b2a5db482aca7e5ba974944e9_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2d642d0b2a5db482aca7e5ba974944e9_JaffaCakes118.html
Resource
win10v2004-20240708-en
General
-
Target
2d642d0b2a5db482aca7e5ba974944e9_JaffaCakes118.html
-
Size
11KB
-
MD5
2d642d0b2a5db482aca7e5ba974944e9
-
SHA1
92079393fbed0ac8c77f8d551003023259cdc0a0
-
SHA256
1461c26244343b67df563556be619d89d24a2a1f46b059e5a01379da62c119a0
-
SHA512
af44371e014d19f1a1533c72546385c172c10e0433e2883d80796fc40be1ee0e3a1632c26e4648b84abdbeb2d6fee9ff6759783878c29ebbc07b1957396dcb88
-
SSDEEP
192:NQxdy+Q7OwQrzeCYpQ38pbekCvhIwQmSyVrLF8tZAdAypJtXwtzBFladZtniQO0Z:6xde7OwQeQebekUqD5yVrLKtavXwtd/+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60fe9601a6d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{10D277B1-3D99-11EF-91EE-7699BFC84B14} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000d53bfad25d80fd2ef598054c3333f4f9b781b05e7b6a633162ba7d95906b66c6000000000e8000000002000020000000eaaeeb9104eee0814f2a250d685be6512f0049ea18372b796dd650ec6e32a45b20000000f185a9f3137101d512fe85503fca075288890cf4a78511328e42df86c50c750c400000005f25467fae388baeae3e8bab9db7b96a45c7e661296f13af934f82e4194295fd1f94eef43da0a5e4a5f488f42a08b489d74ad0812da89e1568ffe91da3e44744 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426653176" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 1944 2316 iexplore.exe 30 PID 2316 wrote to memory of 1944 2316 iexplore.exe 30 PID 2316 wrote to memory of 1944 2316 iexplore.exe 30 PID 2316 wrote to memory of 1944 2316 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d642d0b2a5db482aca7e5ba974944e9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510775502cbe92ae4d1fe0d77474154a3
SHA1bc047c3288999ebf1c599cb589e927b74902eeb1
SHA2565fec26bc51e6cbe764ba88c7fe94cbc3437d2b17da1fd5ff3adb1506680b5600
SHA512b69231553d9e2eeb7ff752f23867c00fb799aa247bf8c1aab9d504bbc84285c8853a8f890900b077f81ef01840e06b2d6d0a0c8ead01e1e3ddd6d1e72d8f0599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e0619f84f66c97c116f8a92c30b6f6a
SHA16b807102790b658a668ff1612f375b35006ebcd3
SHA25641ba83ad5b8cd68caf9ab4d2d4a0e39a3f0a6476ab9f3c27529449dd63b4d995
SHA512adf5c315894660d8e1cbd51cd653c1a3628ce05fd18336c538438e2b3753461fd6e9cf4f07e925d9090a0f850a22130f9f673d01dfe24a94fd543b514bc3e96c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fda412e86e7c2b006f573e39c8cceb4
SHA1ff58e28594357c4c8e76d5507a7772ecc6d01b4a
SHA256a20692cb420162027d1ad5ad8036cc81e7ff8adf5fe6d2c5f11b23ed14c366af
SHA5128724eac630dc46c8499c1750451fbe8ebe4c1b33ae11aae15a6e6448e7fa071460b3dd41ff9fe23348cdbbf39a3c7fc99f0056c17d63bf8ca41896e6d7dd31eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a528eef5c5858877b6dc8bb7e140f6ca
SHA1680007683e202e18260963dded4ef171fd575768
SHA2561908c43621d6076be6f48ad6059d53ccda994f9e67fe8ff5e04d92deacc9952c
SHA51200551009721fae46ab6f84fba30fdbd9597137e5d8b0b24c797896bece13d7059411ac3cff28f69e2f123de0f5d629a7293f435facb7ad754570f0388c08be61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4403666f80964966ef85fffcbd241bf
SHA1a21e7b5f28a38ddce1ecb1f9be381b44ba6da447
SHA2561ed331a156b38da30977652038e7e68bf8328b78b5074d008e907c370221d07f
SHA5121fc3ffd3a2d10c729d166b7dd9fc40c24dd70d9ef9df450fcdea9151c12c2f45032087c20bec7fb1727a2bd0994a52946a884656be9fcfbe20a776190976ca45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a47b1458efde054929ff3bb07f28342
SHA1a8d46c64addec17b17a29157b4bc1e945dedaf01
SHA256f8001c9539a6cdd13ad222ad68f105d8a67badbc824a802980e6e282ef4be960
SHA5122acbfe2096b3cb51a6c63a9dafbf76e2e295eb161f3ef6415f7fd3f9bf8846513c4cc6dc325cce5b85220bec38264a555f7402143ecc031abc1b2c881d4d3d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5768f74e05c9c5ff52e1c591b186509c0
SHA1fa23b31438862a1fd1a7a408bbd3191567ca94e8
SHA25636efe095811e849030fce23d98cd3082bd5a98c0aec6c882acab23753eb562a7
SHA512794d35841c93a86c034be02ad6d5713de98c3c4b6a2ad79efd9579e2319e1586d413cc8408159467beeada7cfbbc7e954851c540268fef7a78c4cf344175f5be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54abf28ce1d29b02bf7f4d053e6079757
SHA164e4d425afd4cbec25cd269312c15eec9fff085e
SHA256bcd932d206809eea19c716611dbb0785ea3729a07bb1ca2f121ad04bb65a755e
SHA5129b41f19a297b8f88bd4efde34f2e9ab921db9e770cc7606dc49694f143db49c4a0c070bc1bd875618e79f6806f81c28b4c029f48906660886485d92d5f4e20eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528d3cfcd0428fc33304a0be8d05571f3
SHA1b3e0029645f8d5082641579a95bec20f290388b9
SHA25648d4bc1763ff9e1bd667de0df3b3f45be5b87a233e33e64c8e539a5a0d77a334
SHA512863ff885cbd0e887e6e83104566bb765a5b80c3be6971e2776531c5c793fdb0a703b8a79684347a865e9df1d980a83fc8d6f1fb7b1e4401e730dd8c8ad6696c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59368fe1919a671640061aa2739889a29
SHA15fd8e24bfd71e237d8e1e276621ecd8e9a243612
SHA256b849322ed3644e2c785e8ce73f50c13b30360933a6fe5fd42b742c8f34539b42
SHA512884d9b0ffbb3dd370bd5a619c1e2d81b568a98372e77636e6e31abc7295f9e485e50b17b4ea01a38ee1f743be466b877681dea99642c4e3ee49fefa01a0dfe8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3c7e3788162e6bdcac4b624d8b18c9f
SHA1f967d802d1d6fe3ed78021255bcfce554220dc4e
SHA2568a00b0b138ce22dbbb5ca7e39054ab654c9b93db836e5b5288a031439744af22
SHA51217f1538ccf2e2c19468f0030b93b5b307f66f0079aaaa1c2fde821c1bdb59105e366958debe35b373511f256f8e55efea39dd66a85511394ed1dde8f43086538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a9e205b827586227d82d1eac46ed88
SHA10a21ac64860cfba5f50f9e667eab7aef450bc701
SHA25619ebc8944acdf8019fd332f80badba848e5a8c737f233eec8854ab13d375e1aa
SHA512ae135d615d94a7a042508b0d6114c6741ff9313809f5a8bc0877275075a1da411284d74437b315581de92b8e29ff9a35a3ca45dc8fe9c99379057999114e37f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f203b72e437f000c69e30e7a16d85049
SHA1c5e3446209a3816364316abcfe6d9e2ecec8d9c4
SHA256418cc89105175439a49ff93a4e309e26d13b91d9c9194d7e3a4d8d8d06681af4
SHA5126a54038d3f6492c6f929f65a9f37d44563162bff09b95164258946a80ddedab9ae2dcac74e3a54d47f4e3afe429e96e42ede835f20edf5a0a39ab6df6bfeac66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567710cdd750729aeadc29aa273e72623
SHA1cf3fd82cb59e69f0f51491732a530d174068820e
SHA256fc2edda0e9fd1700701df36ecbcf0a1ce5594a9231ebc931e78c011cf610433b
SHA5120f75b152726c93aaaf879d9e34e855a654ed447cdd5e79d41eb14066bf99412c136abb5992e0089f9c573fb91b167cd9e5c34b68c8ff4d779b00a00b923df0d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbcf3fd265e5ffd4abc3681a9a66f43f
SHA1da3574836b76538a34a22a60757ab4772601da43
SHA256cb9d4b709fc15eeac6e3045f1ab5cd97f1a038168cde8fb89511561bb926395f
SHA51219e20720ce9f475688ddea8095a9ee3ec351f27000eb824684c07728e44df25a6c8da6cf9160fb181ba049db57e4e670a384b1591de5d013250a5d211193858b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfc0dd1a637c371c299c23c6beb5decd
SHA15d2b78af1b16fcb9acf3a0ef344086891ece9211
SHA256386d0c3ecc91b731c04e6c87a2447fed5a5c1c256392a485c7831998908850af
SHA5129794fc1873971ade7d7b7629b38d5b1c1f658192f28443bcd2cc2a3979b7c5ba2d036b58d1912d6e530a014091652c05f6135dc7eb559bfc54337d851fae08a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d41f4f70985a9f367b231181a21aeb6
SHA1e39c45bc710ca6c1de9fccdb7ac1ed6833be6301
SHA25669411529b3948b1a3954bae957a18eb98b82f9144607ee6ab865e6aa07afa2d3
SHA512ed500931cb6c9815738ccd804a7035cec73d144b6784dbabd2cec6ba6bf8ffb376b9c8a15d91a4b6c1e6f0a8ed4fe449f83d48d074ecc073eb606bebea1ec3af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589669a407e3febad3fc7309f9722cea2
SHA1ff882f67a335658c8222252192262c95f0218878
SHA256dd1d7c8457d42eb47161c04b072dedb53a71f4f481d29f63ed10147bbf892db7
SHA51261b1a29e64d7596be6e87a5b6c2c752d7caf070f92795c0cc0d2f4a998356877befafef64ca06109cca06e1dfd65fc0a43bf8621ec8263080ffc4ae287852faf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M7H6XY0V\errorPageStrings[1]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VCY0HBA7\httpErrorPagesScripts[1]
Filesize8KB
MD53f57b781cb3ef114dd0b665151571b7b
SHA1ce6a63f996df3a1cccb81720e21204b825e0238c
SHA25646e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA5128cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\dnserrordiagoff[1]
Filesize1KB
MD547f581b112d58eda23ea8b2e08cf0ff0
SHA16ec1df5eaec1439573aef0fb96dabfc953305e5b
SHA256b1c947d00db5fce43314c56c663dbeae0ffa13407c9c16225c17ccefc3afa928
SHA512187383eef3d646091e9f68eff680a11c7947b3d9b54a78cc6de4a04629d7037e9c97673ac054a6f1cf591235c110ca181a6b69ecba0e5032168f56f4486fff92
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b