Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 13:11
Static task
static1
Behavioral task
behavioral1
Sample
45f612d9ed6aa09c315c795ec900aa78_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
45f612d9ed6aa09c315c795ec900aa78_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
45f612d9ed6aa09c315c795ec900aa78_JaffaCakes118.html
-
Size
138KB
-
MD5
45f612d9ed6aa09c315c795ec900aa78
-
SHA1
7166f84f33eed464a693abd420beb02ab98f56f7
-
SHA256
f41909440327f2b3709328c836db0476439d3d4c049d7fd9998477128200a471
-
SHA512
fad7be30ca120a2990a6f57bb5a24cc3f2b21fcbc5e4d2be14961f0517f1395e921d9fd67a62276c1b8b3bca163458045703879b5db022c3317f9311e9876553
-
SSDEEP
3072:YF5Oh/SSodbnckaYJNQMcZf+rfdOFYaiCqXZFNajUSZOFEqAUHUopiLFO27Yk5hc:th/SSokRBqxM89
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 22 sites.google.com 26 sites.google.com 27 sites.google.com -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07d9d69efd5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000078b45c063990045ca6833be7282b36cb9ab316b17e870d82bf11222f69c66478000000000e8000000002000020000000515042922a4713c8a8d3ab22090a7ffa7f172b9302ebb4a54837cfa586740921900000007634c8fa605bda5d9a3324a282f406b1357ffd1cdbe21df6132f4e7bba6ecbd369163568ab42e91137f3f32cf2af377e40d5e1a49c7addc65ed1e9c2d20e3998cbedbeb9762ca6b58c94da0511155b4d22c28a9ff5571d401b568529bb5ca71937baeef3ec1cafc6b11dd2fa7d75b105f288fa964c72ee0e12d4171bdefd7d2341bab3383a05a85ba82ca072e76cf55540000000b431cae8bb842ce0eb2a1b886c558e8cf1933b0ce6e526ff1919f70c84dda13c27831914933d74ee7fe1d92a1f8d1de8a9a010f01d111ada8a6a62aeba8ca40c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427124532" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{86E9CB91-41E2-11EF-8340-72D30ED4C808} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000f60c1990bb68e911d2a46297c2206966f651b6d6867a5c2fc2215752d764789f000000000e8000000002000020000000535c96ea0db5a555ed738aaafe67d30f814fbf3fa7124c38d5e6b16ff2f51681200000008e194a6136a40095e77d8bc2138f9a36622d299e9b48bffc2fe861b8504b9a584000000058ba6458249ad7fd6eac21774a175cfc1f9b29ba245ae815ac5ebc933162422639458512f0350fb302ce143da287b5b3eddad7f8abacbc7aa6aa5e3e73f7d0f3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2180 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2180 2308 iexplore.exe 31 PID 2308 wrote to memory of 2180 2308 iexplore.exe 31 PID 2308 wrote to memory of 2180 2308 iexplore.exe 31 PID 2308 wrote to memory of 2180 2308 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45f612d9ed6aa09c315c795ec900aa78_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb6d31d37d78068f2e5a50a6eacb72bc
SHA1f6af6c99568885e9c0e3ef46038a294406efe59f
SHA25608c288c027ecd27f6552791c96184d2bfbe7d777abbc1b57bada769430e819ca
SHA512bb2c5cf19e562ad943a6fa8fa33e37180e3cb61293e16df5c2304720af90677cde167a4bfa9441179d5a85062d28fe015b1ca62a48aef6a29963ca5fe4c728ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ff5a7dd770bdd30d6c72447be768b4d
SHA10c970602a6c1b9b6a41a8820a82a6df3448e377f
SHA2567d0287aa83fc874527af66f17039ed5be5d65448cbc62c2c73de7a30cf3ba5ec
SHA512bcee767d2b69f8d04c8577a1fb8ee2f03781295976010895672c8511b77f421413a4b7d48835dbacc2f384104d373aa32ad8a7fc69153b025276108bc7b0d868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553d80742a85753d70ecc8c30d21a2329
SHA1682b58e1d5338eed2f03afc698d3a5447ee620b5
SHA25604a128374564aa46756596024da9be659279d83534a02fd3222ad5bcd579f05a
SHA512d92e3120944361d666d2a7f4271289b2aabf577c670b2ef14fbe18067e63c11ba6856097919fae8eba8c8f3e4adaa914dab5205825933705edf028978cbf9c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504396074f17c86955b6e4a561113d7d5
SHA1e28013c754b3eb10f6cdf7cfd95a333f1158357d
SHA25602d4bad474f1c532cd8267c76736acce04138dd3fcd496df10d804feb4cc69be
SHA51224c05a3da49ccf260573adf854173ed68ec5e4773b3a479af55d1273e5fe9102d7ddc584470a2c0fbbe25a132c0f76ca3386479998411e067f53a8a62cfddf7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc44d84a85fe01b552b8936d3a10251
SHA1cb8b86459bc56bd7911d004bfc86a2f8494c9df9
SHA256b5acd913ab4d20b785fa0779ef51205a9e0702e00036935c9d9e9fa00d2057ee
SHA5122c60e67b1ac64e1064552fa51b28fd65541f8bd176396379d63f1ace04aed8528219dd62f784532fa1f7983b2973d6fa4620555dfbe028f32b9c96669bd901b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5461fb02d8e2df40f8b2cb5ad8e0c6d12
SHA10512f6a8c3d99085fa042a7cfb7017052a7292f5
SHA2564273b09eb0720376c0a3d2a3f55e5c407a0b37edfe2cf91527db968887132245
SHA512bbee4dbdcd01ea05c5d0cb3e3deb0dd6ee99617c486f17adc80b712cf1c3f03eeea1686359fd519e817cadc492076a69bc11c0070b8a9ec415776ac0f4921f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588cf0add136e17223f9cadf555e01d45
SHA1abf65e3302a8aa2159328a5ee2a55ce8b57d4de2
SHA25612016a25f0ba32ff14ae6dad60cb7e953a80da7c2c31292912b2e8d35db169eb
SHA5124c8d248034bb43a30912106665518dfec9579fb461280873d3a5980ad7f30c3a962a49c55c8a1f0cc1690b0da60ce1d46903aaaf5501fb8e64448c66c85fec39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d683dbd4182687d04d5135457b89a21
SHA17aad211e5f2c4bf67d9211288613378b8d088b1f
SHA2564878c7a5ca7dfd702cc039a1806617dfcbd543730cf322fcb907823f6fd6f336
SHA5124cc5b51a1c038f562c442ccaaa8188790a70b69521e167d37f4661b4287c500a617f1952e1bb47577a251461b7fcee14e68f5f25852eb1a3993d442aac8549c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cea3b4277e0bfb8d159fea70eb5ed7d
SHA15c4e48072f84334296177112ed23d345aa512152
SHA2569b6cf89c52fb9ebcadfdb85f5189c70e90654cfecf914c8ae4e43d8f70a231f7
SHA51234a78281f1e69926f0a0e1e833f5549cfaa21fff430e088f2a1718802639651559f2de75741ddddf5f98f6528c6f0aa3c227bbf185e8a10e15e727e938a51e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d9a093673c1825addbdbf1b5616ac5d
SHA1271fc7ee88f891088876047258bdd96db03525cd
SHA256abb3b3c7e496431bd26220ca38fd68b6094fba6d1d003981d288ce1f52cf3398
SHA512cda3a211d0a3ac1c5f44bddcc9399a78f71171c8e1239c7792b48495f84bd4b838aea233927716a432b281496440cb530bc37467509c4541fdc5a8bc90236687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc4d07a8a54d7e5755b9c8056a9944fd
SHA14a2b2dc103fb7364e512d413f5ad30744f53603e
SHA256c2a6a3ff035029db52d70eaaac54d404529fcae7f1288d86ad6db61146237b90
SHA5123c0d96e0b70bfc6114ac11ba453765ac062b5586e7626ba5a09e25e43bc98f49fd6ca35e4d0d1c2ef0530ec6bb8ab5ba1c6fad4a97aa30628cb48e1a89b60eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535a119fdaef0189d5b2aaf43af134c6b
SHA1f188f7c0c4d2c844f4b4bd4f179f140cbb15b05e
SHA25636dd5be1728cebec393acac6793b3b553fccaba67b46cc888a98e518b8b2aeb5
SHA512c5a1010405482246aaf20e7a06b00951b571cb2d1290ae3202ef8890df48daf8cc5426dd444be1c364b63d6f8e276e8456268c40a84f6d336ad7996fe39795f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7342eda54819a4ed1445b71f7c4755c
SHA197ae78acde0c77538582d2daa44e2d47dbb1cbf2
SHA256103b09bc1f686f0a713c70bd1da1fb86e67126169f5746b735620c7f12977d60
SHA51233396beed2203c969605ae5b4594a16e51d539a94c4a54e58609195fd8db5943036310f8571b85847b31d9297966b17f72ad071f7378e69ef5ba5758a82165ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57872acedfdd68ccaf53215afcfdb7dfd
SHA1e66b76490834aa3f328c6dd08c54256250f551bd
SHA25625ed3ed7635dbeacb8600892bf3ce41ca4adec5c97accaaaef5b85e076b023c4
SHA51225426ae13869fa5602e00cd399502e8b29abe578229a4ffba4760e3ae307dc34c59ad316bbac7c97d717cf697eed4e823681279b813411b4b3a2d923256e0fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c4385b7a57dd00c96cfdda94052320e
SHA1f5ba055e0e57fa522aa6c86de4c4ac81783888f7
SHA2569f72d8017e5b7739b189c8369ee311c0d32b4228749d62b902f07dde061e37ec
SHA51291e2ddb2dfbc100307b897c14e273056c430d01389e0b47ddf34cbb0a5f51c75ad656a7de4c06c567422be963bb4143943df54d0cb043443ad88f81ce2ebbc80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8d4fc01ebc8bb96b4825317d93e6825
SHA1676f9605ed25f7034a50c13ce0c746bd9efbbcc1
SHA256193afd75fffe1f17b15738bfe8331311e3b390f7b4e52d3b62c88f15e95cd5b9
SHA5124396a9683c4bd81d95da6aff6fe1e98e29ef4d8aa77e7ec7c56eb4f1862e85abf472a47c44f453737e60a9a56c79936fab562cbffed5bd6e24667a13fd5124f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ac9a17c456ddb886df2c7b1b806181a
SHA15ff392df676041060decbeb71db1e79baeae90d9
SHA256bf7b026399227d626175fc0d18a13a37b9fbaee8c323818d5fbfaacc36a5decc
SHA512bd087106c407c1778622c677f36b413e489fa8d260f12e2b28f607060f1f9f6e798f1208b7a9b384a51f0ff3e1d32609b83c9107fa2ceb5ce52d9c80358c2513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d12f6dc9eca3fe109b37813171beb9ce
SHA1289b5b1df0ba37b83b0adc23778eeeff570d98c8
SHA25605a25b9e304d8ba493d805b6c2c43b2d2dc8c2e07084d854071a0d136649d694
SHA5125e99f409d955f1af497f7f2bcc4e1f6eeca42f08246b5c0a363be56b89ea8503a9c6c54d45a7d77304accf8cb5920d9d60c21e6c94d651fb987c51682fe9eedb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae3e26864438cec9618bc4d079cc9e94
SHA1d3ea4dbd27d7a449588b2695de7082645939277f
SHA2569fa3118aae5ecb5b83ee47898b7b2eec0726327c7a5fddf03c4d4538a138344f
SHA51265570cc3ee73d601923ea498b46947b30fcf42a7019dfc4dd03baa14a977a5e01aa4d3424f62f3158159c276fa7c5c9a3a21cd4af610ad9dedacb8635ffda3ef
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b