Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 05:58
Static task
static1
Behavioral task
behavioral1
Sample
5aba943d3265ec7755f3b02d4b01e499_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5aba943d3265ec7755f3b02d4b01e499_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5aba943d3265ec7755f3b02d4b01e499_JaffaCakes118.html
-
Size
6KB
-
MD5
5aba943d3265ec7755f3b02d4b01e499
-
SHA1
56838a2df960ccea905551e227090a2534991bae
-
SHA256
44dccc3b3886221b1b013ca6093bb41867fac0848783494145a5e071aeb3ef4d
-
SHA512
a8d998c795e9a4f9abcea111d1d6acd6ae8629d2aebbe9ca2ebbbecadbca2f76b21cf1672a6b71780c6fdab755de146763019a7457f0390a01ec0dca9a771b96
-
SSDEEP
96:uzVs+ux7NzLLY1k9o84d12ef7CSTUWwp/6/NcEZ7ru7f:csz7NzAYS/XM4Nb76f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000000dbf0b17d69e38d9c2399f4cf5ad1282d3c61ed93fe4c41461170af88280a852000000000e8000000002000020000000887cbeb800226badc0d00de753e63c8324710bd9e2f3d3a780f819215c90b342200000003bf2cdcc5e1451ac047d4c225ae7ba8cd4a6c1c1ee424db52ba0307c366817b340000000f463bd7d1b118417ea27b604814555fd948eff9bde614b23b84494446e2299caf10001b9a0d2182fa686ff6f82bfce46f5fbbc28575f9527698b42ca4c0ffdc0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80bcc2cca0d9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DDA3C7B1-4593-11EF-A205-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427530552" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2060 1724 iexplore.exe 30 PID 1724 wrote to memory of 2060 1724 iexplore.exe 30 PID 1724 wrote to memory of 2060 1724 iexplore.exe 30 PID 1724 wrote to memory of 2060 1724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5aba943d3265ec7755f3b02d4b01e499_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509bcc5f0ee814940f2e7e597a9abc196
SHA1a0a142fca06a14c4ae60dcd8320fb1b018529df0
SHA256a53ea4e8c021ebd9f0ef65555412c9a12c52641b21e4bc800c6bae791ecad0ce
SHA51239579c1620628919c9587b310bb4b7c36d75cda882616258a59f931f16772a9af7ca58ecce79b8a8044516839249bd061283a7174968e14a4f76a47168849324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56087407acc497653bd58424dc6380374
SHA1e58d752340c53ec6f80df0fc1e37851bb9cc3e8d
SHA256d59c7992c62890483b3c809974beee6e76ecc78a4388a38e2ff1235e510728a8
SHA512746af7c4c89d413bda986825b678c791c627b25d66640566344baa64def7152a4a775f60e3bec82755db400849b6375a387b56250852fbb81d590a7604bc5278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506d70dc6523d70100aec5d4e37d97b92
SHA101fb949cef058c9c0a21e8b6b0797e3ea66881a0
SHA256a2324fc955300f16d3b5ab63226f0a7b180c0f35ae2cae65e1104dbee85dc72e
SHA51261097669ddf6e60e77a9aa0d99103d0e9b14d82922261beab01bc20297cf79181d3a1eceb2fe8e8d7f25ee8767b69b9cf4bee9d43b311ca62da59dc1421c2c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54793d9c8ed9840f29f5f464d709ed0e1
SHA1c13ad8fc04bd3551a5acc8b9d64f2ec04390b369
SHA256d0286571b60641db437c33bf36cb86a6009b22e120c97aa20be59e7cde4423b9
SHA51231e722ea0665797360f00baa1fb526698635282f4e999f485abdc8b1740b65a8712e04fc1ea274341ebc87dd09ff5acb929239c09a99cdf970801652105e18e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c597ce2fbf7ad3c67132dc380e133e90
SHA1c0d071ab47078607d3c16c92ee8dbb3b549f7248
SHA25668c28eefbbc421a90c1aa475b6a210f53e9317acea083f2361e67ff886771c87
SHA512e9d27f42639cc0cfefa62dbdae6c636fcbd5c4c65858f208948935da475d6d1e72a542ffe9d188ac2c125561b7b06151f6ef2525eeb2b2b5afd474a8b199e138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5c6fcc67ba0068d03fa2b81024a6d48
SHA1a889b0ed5526314ac70e3c55e75202d14b7a33dc
SHA256915f373c2003dbe1e2c87a007ebe4a81a9ba1d3f4289f7e99f2cb870a7b19be2
SHA512a037ec0745f4e6bd51bd7d3d615655e7a105b8fe28e9399b170fde61c399d3a0b483884253b8679461737ae1f0a2a274020e42026672047ddef6c9d7102fa1fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc11b0b9108b03fd38154520802bcfdb
SHA15734232b57a500d4c602ee800bb9012960e2eebd
SHA256fdcba8a65565eb8fdcd23b22f952c2a7cfc8315295d295cda17834af50dc4353
SHA512b39cb03078eb304923d542404cc2e29de6bd617ad76a109442674fc26c84d0b6c0b8cd9b3f2f0a5b1eb9b605830199cbe8dd895dcaf0ee729eb4c91f84855a80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c6bfe70218ccf246093988fd661ec8c
SHA19849e387328e717fab55e17df555e899e32d9031
SHA2569bf010775bcb2a9f5d68495b3a29cda0faeaabfb515fe9c3bd422183356dccbd
SHA512031824d239a318dc75e8ae243a78a39c064b5a444ffa2f9df181c28d2b81819e0e07cca49caf8dc9db95a3613e6a6b7c13d41ce8028333234e5bb40ee981dbf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5dfc6a0e3e9262efaf21c32109424a1
SHA17bb815c6c738e0425a0f8c44e34d4c3d9b4d4813
SHA256dc2250e355d7426e7e2bb0d39254b91e192e088562bf4fc6c26dff0523dc6d0e
SHA5123f530ddb6f190cbdfd77bd6e4eb6c4e51c0256c01db77beb2f2424d440108f99f8c750ff6db724a157f69cdbbf444fd8150ee32e70c74c7a2fb80ae6237e40a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d4aeb8a095ed2db73f67e3ffa46bbab
SHA1ac0c39cb7a95419ac22e372ff42423760014b7a9
SHA25652bd31e0f97ddd7218897a9be96008ae5c5f3c0c68015143f0d6d7a4b1117fac
SHA5122ed2084d11c024b450a72620fc2945628edc744614fd95413877a2ac523fb644384a341b5410cbf8e63babd8a11331dbc6252dd3d5874aae3a90205c79e1738a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea27887b1ad1fc70d39c32b506fa80b3
SHA192df849c3166789365cd0cc49cf4676965d35f9e
SHA256d815506336c8581979753636220b1eab37312cfb88e743b5f4a7fcb32f5a4067
SHA5128e02375494690716d57fb327ce228087d100bbde5b9a27d2aaf9a514d77304f30ae438b9eb64184d8f8dd741ecb7e2cf5d2b892049f65f30266966aaf1f0be73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e7a9409c06fec9aa2522ec7a363c9d8
SHA1397c2de9b87ae9683334645a9d69b4ec9a4a5b97
SHA25670f2867fe33423c2671abcb2923db99fc23931f0a94a7e83456dba14fd26afae
SHA512dbe44002dbbe341d0ddaf176413f4a1fbc32d5e25613e6f73ca7dc024b6d6a63728681e955cca8036ad80b17a63973d5683a3cac71e07e24010e5779a0461941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c1c6c85e99b0cee581da7c69db9673e
SHA1fccb014b7e558fe6462a128377479f3ff161a569
SHA256c06d62b25b9f97f80388aa46dd081bfce8688fb5377570b0df5dad114e3f40eb
SHA512b6b85eeb20e4449a1588f2aa764b01f709d6c6ed5f685dbceac337d774ad9d02201d181cd291e434e1d0a79fad52d3b2d14cbf4f3183d7407c62a6f0b7bfbd93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52904cd797f157bced04a632877f31c0d
SHA1206cb2014c80a8a4847cb5df9660cb3ea2f1eba7
SHA256ccb21c6fb9b44bd22e42f9dd93008b5dbd45bd3f4d4872bb2d6ecf130df17f1c
SHA51257fd8eb6bb5039badf20544905add09d9fb5cef3ff4fecb06913a3596c81a20e7388f98817151128058ad773b4bf5a6b1ff98b4303abbf0081935685e6426409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c501135fa1ec54c03533372609e3521e
SHA1997403419393fa8c69fd2144228ec032036b15e7
SHA2563c3afe19044a350f8a48a3cc6e08267d1d4912828d311781a6f2e80770f068a9
SHA512e8d3e7bfcff5c182e08fbc9271063d8f68b94416787ad381a280ba366176fa95399bda760d616435a0e525aa6f15b953f24ce6de8d6d1b4238a624026118489e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b2b450d587bb37d6250d83b70633cf8
SHA1f24324394fffb32d8a7b3f7944207a3b7e08fbba
SHA2562ca9e81fcf542452c74795cb0c2371986eb0e86464b33d59e00e2f93e553e73b
SHA512f40a391f1969bb4949838ebfa2af67b6a7bf3e80d38debe42e57a7a9f855f6f9401e83795fe286bb1aa5abcf37d50829db8c0473c1b5f32d725db8ba0dc86e05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2cfae6b14381bab66a1f93a6b0e482d
SHA1921664d108471ef27f8f9ca07ea2951d8d5eea2d
SHA256bb92a38e25a656543daf66d0f5a3725cd1c2561e6b8f1ad4fd7845ea49f61cbf
SHA512170f326f70a464d268f5dc7ca3c4e1db1dd68d7eae1a71077575d421e68d82ed52ac08a23ae27dc3a4905c969a411e3ee5da75fb502ee4911fa9c5ea26df54ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512917073aad47da75ad2822b4bb364e4
SHA14e1d6699d428bac2a1d3de87360247c852d49a60
SHA256685b7cbf3afaaecf62cb4a8260acc9f749107304cb85fa8b44552c7801c5c285
SHA5124d7e3643347b39fd012e1ef0f4aeb450fdde9a0efda4fd828ff77d044d91ad36e22b3982d537ed51b584c1ef901939e021378d7b5cc568716d37d9bd3bd9ce6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa277881922505b0e6f7877677a1ab0e
SHA1b8b3948ab0c3f6bddd3ff565f578a2d2462e9532
SHA256867a860cf7260a6c8b92a758f2ae9bbc255e4cd5ca5dc78ad0892ce6eb0d61a3
SHA5122d3a5b0e78263034b877bb56817ea8640b77e055db8cdacc0944fdd1396fcde90e403166f5f5324c9d5143a0287a5b1eda5bb96f83cd48bd48e6bc66850d814d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a05bb0fd77f184a63c7d5108c4d5f624
SHA14f9f2bb3ffa87d01b676a20470da5360807279fe
SHA2564cbb4f36b44682547d03b9cffde60b13c4cfc77021eaa42ad98d7d863a91fa56
SHA512bca6b6a292f429382c22237379038447f7b72df3d64366be4599b6ecd877e7c81c148167b9f9227bdf0b1c0276bc5d1ab53602bf3b5f4ed847561c47df80c510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ad26efb42bf2ebbf7a289527e959d9a
SHA12085f6d73ebdda415ae8203bf26f1dfa4447e787
SHA256270eaa9d3b5d46801827a1633a7bfa437344d1c5236c7938e1b15bdcb81b7af0
SHA5124acff63659f06dde44b54a6582b0081f25cd24b79edc839a9ab44b76b750982e773ff4fff03af70db2326e81d8311a57860e8f7740a2c2edc98253b2d4b96475
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b