Analysis
-
max time kernel
138s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 08:05
Static task
static1
Behavioral task
behavioral1
Sample
be30d19a809ccbe50eba7919ab7e31ee_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be30d19a809ccbe50eba7919ab7e31ee_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be30d19a809ccbe50eba7919ab7e31ee_JaffaCakes118.html
-
Size
139KB
-
MD5
be30d19a809ccbe50eba7919ab7e31ee
-
SHA1
828756d7a72cf35a8f6c369cd565fe726e3b1475
-
SHA256
815289903ade3762c5ecf8d2e0e217a3966643b949b7086e61a032c9a41f7e5e
-
SHA512
3b41dc13954b0448d5a2cc41d82e9ff4a5b8c24a692e555a3625372f5018e2439446af6c9d70086f5e748aa90d126c340441089e8e594c15293dd0231f9335a8
-
SSDEEP
1536:SMl9zyuIdlXGyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:SMlAtGyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9EEC3161-61EF-11EF-BCCD-5E235017FF15} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430648593" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7006edb3fcf5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000d698f32c311b1972837608e37ea3ab6196cd2825e14a382a34bf69c8fd88e1f8000000000e80000000020000200000001147de95d90dfe30dd3f47f018ffe968c0f61e16ec625f4b02d772082da91d0320000000baaad71c4bc36e59b190e57c4c78564f118b1d0e10d9e523fb9da79b464f26d940000000c9ab44aca12c601e765fe927c58d9a81f4ad1fa776dcbae09d813ff4b05b6ebe376ee66cc99c4e41cfbd0e4a3f0cd5ffde16fe13a03bd6e969e9c11cd2f56955 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2256 iexplore.exe 2256 iexplore.exe 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2124 2256 iexplore.exe 30 PID 2256 wrote to memory of 2124 2256 iexplore.exe 30 PID 2256 wrote to memory of 2124 2256 iexplore.exe 30 PID 2256 wrote to memory of 2124 2256 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be30d19a809ccbe50eba7919ab7e31ee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7f675e002c8591e804edd4915431f04
SHA1eee2bcff25d1b871667a4de969eb1e8a64875877
SHA256508c76b39bb2751b456c6008eda6a0313d0f15bc905648808af48e41b66d8622
SHA5128486d027d5d789801aeb46457271efe8d1477d42a9e0f04ffad300f9b076ed73c814cf14b1fd7b08d11b265ee7574fb0be5daaaf34794abcd8edee66d8146adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555a3de8175622df174911e3c35b9cc34
SHA108a4a5569f2938ab59a4a48511a50a841412e7ef
SHA256be699dc4cb9a0f44f10156c0c61049c4d73a5028f07744593442b3b19b0e3a3b
SHA51217b778303ff02d9a065e5d305dfd21711d48136ede871d202ccb1f1e40e3aa676e73152b60ceff36047958267419f454ac5ceb07a0ef4d4a11331cf4eaa417d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c304c32c58c040dae3e88eae9d9667b9
SHA12ae7aeae9dbfcaf46342e62c47cebba2e8a43ca4
SHA256c4fdfc1a2b714a1b6a91df71ec64b4abe97c8a1b316e25509f0ddad04c76d463
SHA5127bda9b3a7c845e78519a2d4ef5c92ed62083f82bd5953e88028463cd79af7b3926ea1e237894403ae7fc52c41668dfe4e02c7f92e96ce3e5b46f099fc038f5eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f39d15c904e848be7874be54d329ad30
SHA154991b23772f6b70379ffb6a31e0de1a03ee113d
SHA2563b79c7ad5a6c53360f598b7628961ff9655f782c060c81fd77ba54b692e356da
SHA5125e56b877cbca1d82858e8fb4ba540e271a4eec9d491fb49828f48052604c51eddaff55690fd95c3c057366ff5fe5d581fe43b1ee695cabfee002b59166ad36bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a0921da37e47ddb24a065715173e0e9
SHA14735459e6cc482acf4ad415ce61a1cc3d8e24f13
SHA256c4105eade784e5c13246ac9d8724fe3ae9b3b9d99792339870d2b1f3009a19e4
SHA51230d316d7d6254f2067f72365e3f92175ece5f871fc2ca998adc1f09259027a192e76ef8c3dfc9f6e0ccae015572c02574b5cb30caedadda02e35918002164fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53022d210284dcc3313d8ae6dd754a261
SHA1af144028e10c40005d5785cc7559225d6fa18258
SHA256be0b7b03bc1560e4e2234192753b41b461aa4dc6cca379b010974e2b5bc6441a
SHA51263833f543fe0f249291024261381fe48c7e781ef315ee61883900586836c19f5ada5bc1245998da5ad84d804ede64e999bad593c941f083e6c72e4790e383602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac2908fb83b421c9ce0cdaad2603ef1f
SHA13b21be580166e20a875f18be3196ccf42d2bbacc
SHA25668e340ebd73738bee82335edc78f61d6b3262271ab3b7a624c9b8dce8d95b0dd
SHA51257031b794054525cf44b08cda31006d1f9642a4d6bae440a03d997eaeddbcb2c50006ccf519a93d8df2418ef258088a6e28ec13c5f61520f13d3455cddead2a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d64605acf9ef62fee302a17b673f0b50
SHA14cfac2dea4352738ef53f0916e0606497fac1cd9
SHA256ccde2c9cee81330ceaa310e43bd180b41730ef2a5eeb1daa9a68761f79ef229c
SHA512f160f48bafc8708ca195aab263ee32b7990369d285943cade8d8563ac04fe00bec10b2bbb345e94f135a0c491b4f985bf122c5051eeca1b65d813136c917ecb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506bf1fa265262f8542864c9b50a0533f
SHA1931c99cbefe7c7e196fa69a3ebd45a3ad6385f70
SHA256dbd545962aa3cd3ac7272cc4a37fe14f1246f8cf2742dcfea8f5ad731acdbffa
SHA5127d17796d95781b8b35defe8290037d74eb5da702c57eafdce1cab98d2efa41f229fbccedf95312f439381d9690afcddaa3962ce7d58846171d981579151d3a96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9556405680195599aa2edec8fb7ff2c
SHA17805294acc033aebcab3e657d9334727f4cef150
SHA2560eee062860a0cbd77bc2c86d9d375aaad9a71abb58871ad4733a1ecd61902f37
SHA512b29e9678bf89cb99056f7df019996f21b54d69ebe30d43229e05c4209f44e2006806acf0859f4ebfcc3034f68d454674b82165485b564f1fc489cea01b629311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b6129a96ddbbb7b3ae89fadaebb9cc
SHA19f3b070cc3fd899aae095f0d8afc0715df5f87e8
SHA256c3dac28435dbe2eada54f4e8750c3269ea1ffa2844c5100f5d9bfbbdd2a8e352
SHA5126c5fabca44804b92efb225b929756bbb898160253525f9d1dfc6cd30ece68e7c6ed1c04b2043ade4be56e765fb8d85f5574390030a09005b4193d6d54d8cc6eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff08c96d4e0f7a51f404bfc4a82cfabd
SHA1f0be0ef171727670d55b994f1cd0cc4c71817813
SHA256daa4384ac4b8305c2756809f7c5dd32acabd2f71d27c4e10e982bf44fc3b1363
SHA512ff08c5f63de6ee46e05cc75d61f9bb578bc58b2cf479c867eee5b19baeaad180f05eeb5545e3c9cd473004263565d8c6fc22cb0ff71194c1080235bfe29217d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec71d487452910d2e125095b633ec0df
SHA1bb9c0ed5c3fd65a39960a6f1dea95bd2819e3185
SHA2568dc9439b0a25fda4b6e6343c8b8b9cb1deaead60c32c945d9796a2eb554478c6
SHA51253078adf24bdf11982cc45068b57773526b8598691f22febf8cada6bf1335b5250ea5b548d3ab33a0111722fbf684c7abbae4d5e05c0a7357fd696637fd6ad7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7db24ef4ed7896a90211fc45f199a9d
SHA190814e1fd66b74ea5638fcca4856ae5fc0e6b6eb
SHA256e0c6bfe347a1601c34d4dc3b467b39fa2f322daa2247885353e35957e23b7afc
SHA51230d4339ceaee0d20804ec0e079f4824bf2939c223194583f46b98006539be5e844d7ac37f6874caed3cc706c865dd63bdfb013103cc77313d185d1dc7920a46e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef97d1d6c4915ad38e53322e6643da8
SHA100924b7130592580797ed0483dae8cdc14d6ec03
SHA2567441dbbd3aaa756181b29ec4bf197c559b98dfa1ce9cada3e1f68ca0f77112ae
SHA51287aebd2c91d84df862cc773c4929f06049fae9aaf2256b190518e89acdf6f3f9120aea577a47b84e3a44dd5a696472fa8186a5173e25fd1448df1a3f05cc7f4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57efb97aae1e1b737a5bcae5f1e42cb89
SHA16c048f87621bb365ca490ab951715fcdfdd07039
SHA256d369b9f6a4fab769df0540d3a0aeec4ca567a0be222529f24903252bc04ca8e8
SHA512f5dbedd61cf8e19f976e1c9a51f13196d83d16666cd2e5061ddb9d17f1b1a5c8e3e0bf3dfc32c416cf6393aca40cf20983ea08019cbc9702aadac5f6cbf78bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e79424b5645f4a7bcff9b08c53cc442
SHA1928b3c3df9d588a6bd3d58eb2203d12436ff2873
SHA256c75df8ac73d566f0c8b80c5acb676fb9938087735645cc83a929bc9d68062c82
SHA512ae1af3e86f599fd1354680602ef62284582feba246219c1ebffc90a6a419c78fb7b13309c8ae12eed4a53321c198737d15a436c28fbe6dffbeb1d34ecb4c1288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6593bf91aa3f6df832c444d7d3183d1
SHA130fea388e17be16550ed208706ffcdb51eeed240
SHA2566a42904c73da88d66b56bc0679c6de6dca2c525d19fb67ef1e26304f260b78ab
SHA5123bcfa29fdf974b7b7637b52b41b48efd3047ec68fda3e6170c1138278410fbba7790f60a983250a2aaa2868604e7021c5c85cb150433d5ec290dd6c4f050a4d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b27cea53db7e0c18a211399d763bb8a
SHA1e4fc07d184073b89cd507f417ee74b65e9d05644
SHA2560c0e413b108c9fa3864f2edb7fc7e7cc43054bc840645ef7da10f4fee7237725
SHA512943f582c6e00cdb9f2363ccd7f9a7e99e506f19e6d6c37fc8b01797f8edcf5b2091245f3ad655a817d2fd75e8b7c31a02500d7afa2ca4aa01d27bfe7eac9f40a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b