Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 09:00
Static task
static1
Behavioral task
behavioral1
Sample
d1907c9971f36a8c4308655fa197ea19_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1907c9971f36a8c4308655fa197ea19_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1907c9971f36a8c4308655fa197ea19_JaffaCakes118.html
-
Size
6KB
-
MD5
d1907c9971f36a8c4308655fa197ea19
-
SHA1
fd51e3c6658578d35f556d916cdd5a196105a540
-
SHA256
231fefba4cf52d2adcf06a199016f10976c2f27d449f226717f7489b2176a68b
-
SHA512
d545b5c5c288a34368b40de61868a99ac8b2e791a0d06956feacc9dbf721e8eeabc8b080faedf37f5197a7966299258989217046fdfd3be57ee8d70f1004e097
-
SSDEEP
96:uzVs+ux76OLLY1k9o84d12ef7CSTUBp/6/NcEZ7ru7f:csz76OAYS/E4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601656970401db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000de3afeeb7b6114b6a0b2150a0fcb8d12822c626aec2d3e3233deafa7bd9283c1000000000e8000000002000020000000f9e05799029c8ad93e1b2af2da465ab004cd6cfe979c405bad685e7ef3ad5a6c90000000b8706e04eca29624ed90c89630fb3a4f1ebec7d1888662aa16702b130e30472ed13c35a736b4f0bc4dbd4b43509cd882295e0286366b75f29bdec433059b03c2251e03bd8d1d02ad9d11168e11e1721e9db3696c26be5c8b2860a13ffbf1243d574da7ba2cfc1615709fa61fff11a05c6701755876f6c04ec757b2fa75c3bf4d0ccdb27e401c3e1ea1e97f9762a58b304000000049d7b7a29e1b311674f3e931fba52ad952a05b796e89381a2fe8a62df17257b9076f9320124d77ec8287ccd6afdbf56b35fb96525f86334d300a0e4beb0115cc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431861510" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9CF1EE1-6CF7-11EF-BE65-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000430db634edd4e47769d2ab9da35136766dd74277a641ef15cfbe562c0d393fa7000000000e80000000020000200000007ff6334a88eb80025e5d7a493c6908c003099158e126316f043d72d828c1f55f2000000042ccf02271e721e2baf318321199b413c3ea3b10fc6d2ab59e4d25b676c8847c4000000078485fe2e13f3a73dfcd4ce5cc8de12a6e6d8a0a65c46178d244577c1b421d32edc2024b845705a763f6e9c9a611412202b3c59a86936a8d811cedf8aecc013c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2688 2824 iexplore.exe 30 PID 2824 wrote to memory of 2688 2824 iexplore.exe 30 PID 2824 wrote to memory of 2688 2824 iexplore.exe 30 PID 2824 wrote to memory of 2688 2824 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1907c9971f36a8c4308655fa197ea19_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5349a2ce0b0821bf8e713ca305bc5cb97
SHA1b80f785a08dd017fec6251b12b2ff3595b9425ae
SHA256f5366289f493c819ba5a480ea82b057b0fd075a645a9226b2dfd19389bf4db50
SHA512be4a0114f1291215d742b6b5b6dde18b5f8777e872e60f7195cbaeea2eef336be4983a45adc846f86b3ecf038dcf797644c8266acdcf3a5655301d6efa0a76c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550967bed2cfbe6b138d30bc971c58f58
SHA120037058e34add862629e680f3b24bb9489f7c37
SHA256ce5defd9fea8dd8ff15a914021d93461b4aabffd675785889eeacd546cda7ec1
SHA5126f1e4e7088e3840b4b7daf5a91ad47037e0c5df0564919559823e8675b19fb9166154f3f11d90466c5792e95f167b5ee48cd346dd72417347eb10bd7a8d94a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac88e23c498639e5fbf327ef225b028d
SHA1e013c722c75e174d34aced6c85ae4180229c3e57
SHA256da9c48d424e778b2aa86a2c9007082f15689fe99666205b39e9646835d438e8c
SHA512df9ac31d1aa6f53d6f1c74e1b5d678f518ea54644e388efe9f43932d9b5c8d9e2b2c1a52615973ee14c08724fdfb2a4f98a2b68fc80e21040fec2906e94ecf56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6cc30424a93aaa4e691de4bd184be1c
SHA10ef08bee167e12ce787068ffc42ab639c3356dff
SHA256bdafaac9c5da4ed9ba6dbbf871067b94645fa89bcfbeffe750c403b408b52328
SHA512ebc1055339d1a069015769bf473227b9471050e3ea9e100ca9a0a202f5a70bb81c9a295a6332fb38d742e142a4cd1641d518017e7f86c459c1b13f675330b05c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a0a18d37968f16d704bdb29730435a7
SHA1acb6ee09da11f5095c099b9835603cc64c46f126
SHA2566f6a12d0d44e715d368219502a8446ba69978d07f24f21b1bf1de1adf4052538
SHA512c9f38b672677f9fada8be0e7ada8959ba2db637f983d09ca2b7328332f608366ba4f486fcd5bc8f5c691e0e3b9903bf18d5f7d2e35bb90cb1053ad2e9c963369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53170dcee82e5e8e2881c2c2369b271e4
SHA1adda3385060382c50ecbd10687d831540ab63767
SHA256375ebec73d8049b083e0fcd3a353592e84739aa2aa291564a54dcbae7a7c6cf5
SHA5120aa88277ec075c2cf30086c294d9051743287b70b5131907f3c04bee61493090279de81f706739a72f7caa465ccda2339538fbfe25329d297ae3b0b8e4f6a4ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b12cebb702a206ffa7aea961252f87
SHA144cf92baa35b04ea97c52446bd5ee5b5a3d94598
SHA2563231df0d5186da04872c302fa715d4272aa4083b21a3e992e7bedefe47d165eb
SHA512e10c44b1c8a68648e56b5f2ddeaf640d3068551b4536d4e4a0fad62a8d7e12e9c3efb5b360ed3b6112b1f5d4c164047f066055feaa671aad780b1e1e2d56a907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be0d8b7bf0ccd12fce21202d850245bb
SHA1c75a31e68cb5ade08ebb59792308bbd7ef873076
SHA256283b2c72fc8d68cfad76ecd692a1ff19f24a7cd9c272cdd893210f04e07ad787
SHA5122423cc73966407a526eb2e760dcd9b7b9c54530d574ba2e2c84ab57e1bb80f7f4f710b98d5cb24f81798cbc9a446ddac646b3a1c507915f93a0a3f329ccce297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0a5404c87f3d69e0fb1d1b73f624ae1
SHA15c14ed8eb1d12f485a4267ed8bf9726e16e4e07f
SHA2560f1a34dadb10e6e037219d1bde31033e58617988410c24e83f01f99426f5d850
SHA512a619116bc868cfec6fc4358da4b7084a0149ae74fb7c09ae4a85aad48b96d0f2ee20dc76750ba83808b0abd405145583ea68bab305ddeda0302b7abe5fb954b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cbe130d136945cc939991df3d1107f7
SHA1e5e3268aec112ddd7313c18eca32bf1ad19dde05
SHA256edf928dcd4f6597399092625d4a917513e4b687605aeed1d0506d3ecfd521533
SHA512ef42f634f1d6e79bace66580ba8c739ca5d45453b1aea212c5df870dcdd024992cbe37ae02e457f166c67fde5f4c86df730fb838c0f8f41ab92110d9913ff464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d1b9b81865102990e2d3ae8fa48ee53
SHA1813ecd9fffd033d67b719db34af514c3b8bf5f25
SHA256b84932a1f8f2afd1f1477bf4ea9ef8715ca0a93d79ab7170e8de89b690774442
SHA5126396238dfc61fa65f9fed1721704e0fd8afd3b23e93723fcbd2678a1b18e741c1acafced0e6fe2cdd31dc8e4a84ef8ee370af1650cc6a2339e09376459d3f510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fc14d8d6dca877190f4d2612bebb552
SHA1caaff9e972edbf7facd96df6d34011a092987b22
SHA2568599154ca839d8c95e03c651ecca4bc01ef0ec1113c68a8c3443bbe5c7b8d4e4
SHA512d53fc8cd7133441051091ea15a8fc467a7ed003188cba400eeff5b1c9c51979c3b54d4973ae11240a68a147c92aa0d3517202b98b0e5ce5a1ab781f76b776165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5905da6ad6f9ee0cd59ccca2506f63bfe
SHA1a68f3456dad6ebcf62037d6ff2ecb25ab8fcbc9e
SHA256195773d91fffd9f62b427af1ffdcb03f1875236405ff6206ce80f3000ef8dfd9
SHA512902589efe653c25109e0d2ec406d966baf7434db3dbb94e377b4d30cb719bfb2bdaeea2e9307f3eee825a759e1c52c6f946b62dc88abb05f612a6677f1bf5506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcea23a8510d995449b14fc755a7bde9
SHA1078660ce430e48782db738bfdd23b3369d29dd27
SHA25694b47ce154e88ac3957dbfd930f42d87440152d8e6983d1200cba14ad63d626e
SHA512c12ffb02db18b82cb02aaeee39680fc6d56e4361dcb56eeae96ade13a44f1dca5b5bec819e1ccd92a170a1f488c939c726a2452c2e008a6949cd6a5318a427aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a69b7e345028ac40b230f26a0b47bd0
SHA1bdf3c0df32b3435ace9f016214337a6f2f72811a
SHA25601f229e926dcc93f70322d6f0d36d7f6ce1deaf7d768b54a46524f52948fa75a
SHA512052e67499054c08d229812e255e224de5863b5d028fe00ec997fb8aaaf077ceaab544c4155cf95333571764f0d3d1e57becdbfcdf2241e948d3fe948d60872c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dc167796f8a68562c044960bc2d3206
SHA1e7c8ab8a94e23db35d3d9a1fc664ca67767a4572
SHA256e3826c8d54527f720a5de300fdc1495ad57fe7106be6836d70540f9b4285fd10
SHA512aa03689ffc6925423cb748fdf4a6b0542eb95e7db8ecb85cc4ec745126c8923b837490e7fde02f2228124d8969549b202917e5e5d2077b3acc06f1c0b507dd88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c262591af681288cd0a1961c859bc8b3
SHA1fecf60a8b27abfcf92f407da2e7dd152a1d82de5
SHA25667e9d953ca2664707f7fbf0e5e5d3b86b9030d00410f3ec888ccf0afc0521542
SHA51271cd5b05fad02e6a9ace317c5e5088097f4320368bdcf7dc36f328673201cdeab721781ec1329ba76cbf1c381fb3d9081f02f8e5271473fa7c2d6665f89d9d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59590df206af58a62b05d62068d5b9f6c
SHA165869579dd1e3e7b8dacd339a069c4a2e98a45bc
SHA256b83311e676b8767836981d9458cb7e21e6738b9db3a80c9142d39f989d76e32f
SHA5129f2d3cc48f32a8638f18c038a1115ff2efca40ee2273de70fca678bd18d09270ad85f56361b1f0a8eee9261e9df4d69fd286338b6c0b6f634f0525d3d07c15a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f2a64d210812d39cb94000f7444dcd
SHA1d4d602ffe7362d43696a5af0966c7487f5cd4904
SHA256beccabc31e14722821349be676b9d538db48b748f9021f84dd5531b85dd8e04a
SHA51243186bda19ef5a23296583d8c27b5937120c26683ee72beb3edcb8524413945eaa1b70529f9e134b79d5571a067ad4aabbdf6df52c791286d108c73a89efddb7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b