Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
370a3f98b5a5961c850e2ac1e3b89242_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
370a3f98b5a5961c850e2ac1e3b89242_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
370a3f98b5a5961c850e2ac1e3b89242_JaffaCakes118.html
-
Size
53KB
-
MD5
370a3f98b5a5961c850e2ac1e3b89242
-
SHA1
dc3dc27b3bed94c52a9235400c9af46b8dcdd812
-
SHA256
95944ae2922c05e13acba34a0d6352cab8861fb70b40dabd288ccebd682810bd
-
SHA512
6456a932a34cc9176d324a221b71821bd006ebbbfec8c42dedcb5b5919a0a1020e4e7f3115ac6cf9120ac0a73f4d3aad2ebd3f2dec15db720e3fc43352eab81b
-
SSDEEP
1536:CkgUiIakTqGivi+PyUfrunlYC63Nj+q5VyvR0w2AzTICbbBov/t9M/dNwIUTDmDl:CkgUiIakTqGivi+PyUfrunlYC63Nj+qs
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000009a7bd183c0b3159942e1ff1656c58cb879308723a053a5bc4daf08e1b9b9c6b0000000000e800000000200002000000050681d5dff64a234ff9752f363f694c9d684fad50855095e18b481076fcf4abb200000002d218b71e0d02f3b4763e2d48e322521f7bf80aa794a6ab296248db2acd5766f4000000091aceb1be09ed56bf43b1753747962aceccc373e5428811ff9fad1e915c5e09d0fa826e46ceca307bf7c5018f950d73a42fab20eefe49e5669e41a9cf186253d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0116A01-3F1D-11EF-8995-CA26F3F7E98A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426820062" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8021f7782ad3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1940 2012 iexplore.exe 30 PID 2012 wrote to memory of 1940 2012 iexplore.exe 30 PID 2012 wrote to memory of 1940 2012 iexplore.exe 30 PID 2012 wrote to memory of 1940 2012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\370a3f98b5a5961c850e2ac1e3b89242_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd55262516b66d15d527577a49f60ff2
SHA1d29e04fc4e8e65028c7bcfb6c656a00a39c2e6c7
SHA256e58eda02deb6c221136a4e61e1cf97e66b47e42a893c03af9f64e9ea07535366
SHA512a5fd25b7b18b20934e60dac591c9fc47c02dd2503189920b89ed8d8a0695949538266575694afc7927ea2e5afd8d2a1b06d254d77e096e1603477a49c343e411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5106ff7da9313f84d655f40d00f17a4cc
SHA144b6391c39fd5476501fdbae556832a0d25c3f0f
SHA2564b0122edc04b5708ca1c2c01fefa962c41de20650c2dce41258a3eb93c98fa6a
SHA5129d776c97fe8a362df2b17107366782b3425d187b1fa3bbc358f576978f9d191495f4421a47f165b00438cd91aeaea68cbca1cf7eb9b7b309c4debde4859fc762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58af33481b01afd4f5ed3852c663776d7
SHA1440c8d1ca8401f7a6f1d1fe5d48c38ab573a4b04
SHA256bd4538a626b113032f1f2550d31dd17916d251fb3bbfbab0288630ec8164448d
SHA512b9e71bcfae3a6a3641e1420a0ff7659f6195981cd18e30a7e89f67475655ec9c7ac4f7b767b60a97e733c9dea0974fc9845c86bf3e7898b46c47606cdb6f2dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57149b4f98dfb3790fad8a0d84c617e62
SHA1882339d0096696a533ea8f12b6b6ccab47aa49b8
SHA2563b7b9afead10dad7c7adf65cc86aa7572c39ad7c544e97682b93f15235389fa5
SHA5127283c5f4a36624ccfaf121d55a9863eb0e940e2f3a9515bd708fd58997b9e61a0634b642d053ec903a699cf65a14c0fe69476f79a315d32971f25e2c386dbd60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558130a8b0259af928ad68821c981f8bf
SHA16dd71e92b40605fa7a197ba5f3d9e98bda2abd28
SHA256eedfd668b2cfa5356983f26787c909422ca3e25e24a2ebf92c42b6385a9be450
SHA512a067156ab7dfc1064e48e3b1cc4c0bee7f767063eae1eebc094bb244307dee935f2d9f16489d081f3a8b198f8bfead822b26439854d702eb5786801b8c25aa69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d8f9ca4560d8fb5ff59f44ad4868ebb
SHA1154473a80d5ae8595b5bb29a3d209456c5117a83
SHA25601ef22b44cb5e8e739737f1d7417b209b19ebeb8d354db740182551f98176106
SHA5122b3084c006f07ea34d0bdf247f941ee8fd5de6dc6820360b74f5748e7fc134ab4887447a78b9b0190e37a4deeacac76c38f96084dcc0a4bedab8552934287ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d910be952400f85a8531b428615ea47
SHA192a15f12032efa811f5a25e453db744196b516dd
SHA2567d3171d49ed4a3d7983ac87d13d792bc7bebdc94e1d1a7fff21fa5858e3e112b
SHA5129478faf1ece7ad2f751778fe0326a84be2af450435232f7b1ce1061480db03e7fc4970028749d555a1155c2123bfd4a607072adf8512803c0209092ec10413cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f04c47ad9cdf30d3176af2bc4b7d495c
SHA1e50d88b5107bc2c17c19ef9a7d1ca968d75c5cc8
SHA256be69d7ef9041a01ca45efd101a3c5c7668e6226046f78e931fa10305f2b11432
SHA512d5c0d5a9c50e39e9fc61e3193fdec88eca3763670916e063e001155133188097cdc107c0701efa89483e0ba87e9f529e6cbeba6d2225c588388f62c8e018ad46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fb450a98f49d8c081b9b2ce31dd86b7
SHA1f7cdcc7411fab2340de9bf0d7d354ed62b5f6e11
SHA256bee87d393a30ba7266f86866fba0cd6fcabb9efd5acbc88ceb6a256f1f170c54
SHA5127fa96ca2708fb4ac646c6ed772061cf5a68d3dd20dbb4bdd7e27dc48d9488ca3af2205511cc774ba093d2aecb02b39d010b5f51165118a08133ba57faaefdf8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a34013bdce306118f3cc5570089ccb31
SHA1f3c131b46b65d5ee15b193273a3ef9429eeeca73
SHA256fedb7569bfe5b89de16a4df43cfedddcce603f69a180e89ebb54bbfda811d548
SHA51249dc8393ff3a85714f7ea78367dffbb42d36e09b70d79745eaeb853653aac1a8f25eded981262b10e6b00bb1a6ce4be35b259d5922f04925a26c4397b0010561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eec62362f89aabcd7462cbbfc23b6c7
SHA1b9be97f338198e8c724ac3c5433d571ec1e49928
SHA2567fb1faaae1f20bbd63bad96a16adc4ecda122e0fa4cf6222983652b1668f5bba
SHA5128f26612be441ffbb531e53c48a0c8540abdf597371f4457aec997a8c2f8dcbf14540578da5e9b10dcf9c7df58ed8e5e6189815c6043fda8ee0284e34d2e5037a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5398b11e3e3ba4f6486b9ac6fa57fb69a
SHA18fc7dabb1d3d76308977603c771df34df345a81e
SHA25660e6615a34e57856d6ab1dab32812e427883d2ecd0dedeca9b4408eefa9da98c
SHA51230c5d315febc2b44e170b99c10d6ce6fc7461f0efc58cc407aa780eb4643975d124354882fa62f034b2a547493b128b93991c168a2c27d9b1d807e9db75e11fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae39772b7ddf8485717900c5a3a8eb9
SHA1d812dacb833f5ce944ad0e0a28b79fb32306813e
SHA256446c0affd50a62c877e1565ed47fe30ae05ad0c527558548da49117d064af84c
SHA512f2c708e6cfd9d4d3b2970f902044cace5566c7adf23e30faa09959f4531149d12c8626a18e939f6b275c4071899c83082aa56cd0413b9c6a73f765eadb6e5bee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517df70c5f848bfaf36fa21445ed61f0e
SHA1b449a4416e6b58c502e71e61e173e6fb0b27a6bc
SHA256c7af42b70d7909e07dd0d7045f4e5071b521ae9477229da0575a5110b126a55f
SHA512ca7c346c9c1d7dd31e4fbf93856b5db54489d68b22bdc7d50f6bfeef71851d69dfed17f8736e35b5aabc13f9f8c5111b13fea4bc63c57e2f2f423a6a9b7e382e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0eaf47f36d59df93e0e57be1499922d
SHA17070b7a71649afc5f08ba6fc1dd19fde9ebe34b4
SHA256d3827e90ab7177cc52dd76093c1437e5d284a688a033cc467cd5ae918818f9db
SHA512af49a6991be1e2dec1cbee3ec573c050c1cb4e6d1ee201f9ec944e11d0859494798ab023d1473b8b04f7ff76f60efbfa04f1075e99db376e6d285f1136bb0753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bcde0101afd2022da4941b724fd4ed9
SHA10f4c6b1790a3e8f9c4bf275813953f22dc0bb9b0
SHA2567859adb3c15616dbe7573220f9dc56b79272fd2baf0ff37aa0cf35f48bc557b5
SHA51254a08e885a24c5782306a78dba68cbf56e696b260806b4e2d68b50fe0652b18094ce9eb9815d9bf71eae000ffcb70b5b63d88955981fa70fed49f4d30413b96d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd9475f46144b3f2d8de149041b1471b
SHA17721aebaab7fffe59da8d8b39d331e75f74e6770
SHA2566bae46b8594eb24856ffc79a23a156f0202bfea1666b9045abd49723d4e7ccf8
SHA512b3fa22658b5896a8d66d058ca35fc5a8d512f051ff423e70062fb81a7380584dc7a88ceaf0d977aec05b05fc646c873acf30ac739f1baecb3518b59275934fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da04003c47c936bce4cccbba549f9940
SHA16b277dde4620fe51437b55c201b5f328a5020772
SHA25632a38b513a7d0eaa2daefcdf93c907a72f66685e1e58e7a51decfcff97e59679
SHA5123d6bca371fd559ee53429944731c345e6de75f7ef13fabe3179cbd8f7d52ff1fe5bc9b62addd2dd4fbdd6bdb476ae3a4aea8a7eb87daaabe2f53a184c028ea90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e2ae818bf731ce55271f5e9da7ebb18
SHA195708979839f80ee557ed1e9d20673044761b6f6
SHA2564f0176a6486388cbfab6673a94ac75d9bca94e644c03ea3ef075c17ecca49d4e
SHA5127844ec4515d5f4677839e7a35c00ec8f523b01613d531bebf3249e285320c03e85425bc2325cf31b9e7dfc442ca875abd08abf163716a2d4ba2002439317f7f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514b6882ee6e36266678b6b44b580be70
SHA137a010e829135645d8957033474f011e10e875cf
SHA256ed1767a3bbb951804a6860fca34a6b18c83be0a3513a86da6e06116b3c8bb4be
SHA512c2f44e6cd928bd0f810a156adb2a09107e9123eb419cc44a97cc0d2a3276aa8000f152e30a62303db12616c75d5483a95eed13f6ca83fe044fe11164ad2c7114
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X761FPIN\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b