Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
dc09a6b17121c4ab681c525ecfe624aa_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc09a6b17121c4ab681c525ecfe624aa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc09a6b17121c4ab681c525ecfe624aa_JaffaCakes118.html
-
Size
20KB
-
MD5
dc09a6b17121c4ab681c525ecfe624aa
-
SHA1
534bb782cc2540c6108f072a243aa98c89eb3079
-
SHA256
76524d2a09411e73294f58ecfb43a24ba130bed63b2452159c06e910c6c1f1f7
-
SHA512
e05281779246b428a47f298168084c9c0ca76ef59786a48690aef1dc8c60d81fd09de7a5d18b19cc89ab72a35d6d9a7439815d54a375573dc52d85fed0e2c89e
-
SSDEEP
384:CanlVBbjPqoV+zji0Ft0LOzTQTzT+TCTGmvTG8LYqnJTydoBmUjz:nlVBbjik+zxPKPg0GmrGEJTydowUX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{845FF991-70D5-11EF-9081-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000032ea282ca2e67c95547246d6cc100a5ba135f667c21b4a06bc21dd498648b160000000000e80000000020000200000009a32882341b45921d48f33203849e2cd6b4b39c53420f4f35b89292bcbb3adb0900000004d356408d43d1591ecc06c6685abf1f8314e3385739e3002c3a4ee238573c5f7b52cccf2724a894fa233a0a39fbca22cc43d179c0e407dc16baa5ab223df7bb12b99756b77199c15fdc9bc5f3be0d1d499ab3c9d9df12bb7d829d5bddbd6ca34fb7e8d8824cc86be92069f06c2543e8a48f5d1438dd00dbb901103d425155b470e112a0310c41e98050e5dfb46face694000000019e22bb6e8ba66a6e8bd9119cc97b50b68e0db593bdc0dfde90932251ea470b9c1aaddd4a55c4df1d6e7d1b74b6fda5ca2572b7dda44acdf5598a3c066da2df4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000006b56aa1fca30d571da2f03ab71e3f5022773871686222ed3c930dfa978d0ce0d000000000e80000000020000200000000eb5b80d601bbacd55caaa426777aa87aa662eceb66095b4ba8f3040c8a528072000000054e7ed80071650bfa8cc5e615e213281a253cae1f4723166df3d0a1baaa0514440000000d3825ba445fe3b01a22eb7ef402ebb5ac5ffb935f066e913baf0c58375f6b421fefe8900e7a46eedbd902e1c64a18466186bb9da05b0bfb3c745b64ba88fdd8c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432286651" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e02f535be204db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2104 2268 iexplore.exe 30 PID 2268 wrote to memory of 2104 2268 iexplore.exe 30 PID 2268 wrote to memory of 2104 2268 iexplore.exe 30 PID 2268 wrote to memory of 2104 2268 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc09a6b17121c4ab681c525ecfe624aa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5863e2640af5d86cddb2f234fc1e69070
SHA17707a343aa195d76489cf5eb5a25a5c344f80aca
SHA256688fe0ffb49c9f6d8c78fb348ab91d15623acc8416e036bbf21e0838475b216a
SHA51284fa8c066ab859a603ed41ce4760db7306583709f2192c6b2a0463c161269d8b086340c7ba20bb8679ce019954c301caa99490044aa42ee9f996fc1b7781212d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5743e5ebf8f0ac850df89f27da5e6c2ed
SHA1b05bef5fcc3acb2dc8d4efc1274511915104203e
SHA2560c796da312705a95857d522bb323dc7b663fd78f874c39f8d94fc7878f772d9f
SHA5120c9f0bf0c445c89fa3ea088ca24ab295d11ce107b7dd3d0477fd2f3d8847c089fda692c0d5ca774bdc7dea40f3381a27a2cad9c0a20c10f25b83b4a732fa0c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5428d29ef906b0bf6598062ff68130867
SHA183e01fb4db06ce5d9ba54315ed7a2bc35c7c0aa5
SHA2564f49df4a9c5573dbfc68b199ed05ea2c0da90d4b047787f3320875f4b9389433
SHA51211cfeaee64bc5cc0d5fae317c250f86489ee486074bf83f067e63ff1ea23d3f477d00735b04df392c023e4c849c3f003fd529f9db5504898139921e112f57a17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b175fabe6d54f1bcf5b98070cb3bad12
SHA14d44076be4c9ee930defa7317ecd7aaf25473ab2
SHA2566565b224ad28c84014e38b82e0ea940c276e34e4a367f0451733c13d3b254970
SHA51204434e7fb721c7775df18b46e969c9512e447b03ab28797a2d1018c28f93bafe0ced3d2eea8720495905cb30fe13560fe023853149a9c08c746a15addb29329d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfd5baf904f18d07654820cd632ec1a3
SHA107d1534c4b7bdfa5fa03237eb04bd1c33af44487
SHA25674329f3d72213497758f8c97dcf58c73bd0a8f8ca8b290203d6ad5b9bb7c1301
SHA512b104b214af07bdc8b916fd0cb23a48d7037c9ceab4fcc02f813066856718b597473c046ad8955017fec29864ae738d854d50977d84eebed538f47f24ff4a7672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58442576a7fe201c79b5cde6938c59d45
SHA11bf9b7e63ab8a0d7bd4ea3b1439c5cee0831bd1f
SHA256fa99a31a668b4b67de3814cf1a55d67d19229f9e652cbb042ef2b880d6718883
SHA512c373123ea7f20ca7af4b4388c065b9a790f9d573f5b0546b4598b1de1d755c14d285e9a0d9a301288d29380a825c5b1dc54a25370e974169eab957969679ca8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d0ad79110e068118a4ceeaa25692116
SHA166e618e11e5c3f9355840eedb58d0124afedbe95
SHA2566a100d22f2c3b526d7cc0ef29cb799f6b63c8a7eb26ec92ab2b4357ef9c37d4a
SHA512986effd8c4e76460bbb276435f3b254c7c6072c52925097b37c66802f52a11d2b2fdd66da1e5e49b4042aa5a149e98a5673b36294ce6843f71935be28499ebe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fd2b84d718a2467cf1354ba1987ae59
SHA17e08daeadb65a89b60b490b21dd8ab217201231a
SHA256da2239e043c42e6822a6ed4f2788dcefebbbe051698ab6fdeecc64d13b58df42
SHA512a9941ee986998be9d167247c0caa5373849b9184dc868087b06dcf0ec40921fff9cb921cdfd8e51ccffe8cafbbeb192c86fa80aad750e18df6c70258557bff12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515a7f4616838e7bcf46d668f5e1f004e
SHA1d5668ef4748da5a89648e021675b0cf09bbb2634
SHA256338ee3763be768d0284be8f42d849772cfbe1c684b004ba89e2b86357946588c
SHA5127063a553007537172dd803c2e4f33bdfb875063a1fbeddcf76e83f1dfcfc4338067eb29cd23ca32fef3d44ad303151500577344002a3d5328225c5fa84969cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50917fe85cb92c7a2ce1113edce1adb2f
SHA1ae9b0099af4e1c836caf6a21238a7b6e2cb561ad
SHA256a70aa0180bbe378ddd76bc22cf41300a5b9149dc7a5d2fe857a64106192c6f4e
SHA5126089996628571b7dddd633a8920a7d65c5f17d4ac632e7d348a2afde4d52f5bac2b1c69a1cf0756ccaf30e8c3412eab16a2bc5acc8d5c239370ec005b2ccf277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54878add402d84f5b6fdb64e9325e6b18
SHA16c9b71aad95aeda52690b16154b3bae59a8df736
SHA256461697385d8a856be61cca201d1bbf92467a8119823d7014cf891b9d706965cf
SHA5121936a1f8464f2058375f1bf167829e14397e38871e910d356aaaf84de08df0719dc2983c29f2443cb464b02d9fc455e0b2d9861a20cc1e1b1ff0e4b29783d528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf2aea06cd149a382c637918fcbbdab6
SHA17b897130ad6251fef3c88e7890e6ec5c083b7019
SHA25676857edeaebe501ebcbb011f442f4c3812020e64284f3c8bd5cc42459aae6d2f
SHA512b05551d14067a1e512ff27cb708c563e2144e6969e8a13523a4eaa09bd1f78821f84f736e275b0679d5bed174d7c11d5e15f9fb4b36c3810a380c01c270ab10e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fad117030cc79794623f26d23bd2880
SHA1cfcc5af76bfc12a362f2c82c2cc9ddceede5b908
SHA256c7e51f15e9ba29c199225c820beee14b79a0b69d42a466ce9f6387345cbbfc7d
SHA5121d24685098663e255bb68fd63868ef775216074931d6aa050d42e0d708b7593f44a23bdd73b08bdc35d8bdcc0c626a62cbef3167b9e6fb2ae88314c158935507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2c94ce9d400222f202b86cdbcbec015
SHA16cbf9128f51575382c803f306a2d1dc89171d9d9
SHA256b6a0f60a3787c1fa2606840a583bc39ac5afbd9fb2b773e084017644f15993d4
SHA512a77c05d75f5974cb5eb1dfeb396b3a98347e5d821b2bd257ab9a4f5b1b46b5e137bb997c7bbd910b27e57c2326e7b65f764a605c46c52c63d04db522d2f3c6b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0a75b0da3e9ef6a65e5e8fec48c4eb9
SHA198d89c356035d48dbbca4fca3f8f947669bfc702
SHA2569aa1653fb2adfad2f11014579141d67b44275ff3a2efb6ac7f226042ced0ffe7
SHA512bca04172ba8724ada60c1231427e1dda22a9ea10300ef2b9a506b86e77cea00a39c41123b37499a031321bd280b6ca499f737bb725e2e7a0da1fbdc99e731830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4a6c10a91ac9845c9a24e90bb8e8228
SHA1f044b3a1909bae1a59f3cfb736cbe8cc0a8c98de
SHA256fb82ba7342d90b1b15ee012cc326455caa3c9391b94892865b0b405d2eca7aa2
SHA512db9adbdaa5ad1ecd25de1b489af6e78f7c5bbc8383ff834823323713f7fb0ee58de400ca5906ba3066500f024668eba50f0d6d3285926a0009cca0d1d2ea687d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55322154fee30ab1dc9f88ab496966060
SHA1a560f191136cee0c336d938507823230891592c5
SHA256d642faee5b5c9b9174a169c958f60b317861f62084a7f911469cef18d36efce8
SHA5127e6f486c719fcdc09068f6bc220e420e77cf576345f8cd54229f6410315c43b667fe2b462cbb1914e9435556fe9788fee30c18bf176f434f712765e40e03774a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550eac2a4604bb45a5eda474a303be243
SHA19ba4f6cec4107ab4163c53ff31ec929635e2f957
SHA256604eff9eeb58c338487c4e2aa9187fa3f9ceea93f5c395d0bd0bf2e8484109d1
SHA512b989cf95e09f88a9a8a5bcb32cefbd47f9f50bf70fac4096333e187292fe7ba69b34af2e5ff4d88dbd586633ec87e022b17684ad4f023c95ebf04c4340c6aa40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506802c0ab4fa0aef9a0df711ece56648
SHA1dbee8d05bce1e26a72c3c8da692e80ec11f62572
SHA256dcc584b9bbe2c11024dbc5f36a32503e4ff3ddfc1deddf38d5ae577f69936233
SHA51212e6ba6005b7311117e379ced5e87c7fa5b13e2aa92331c149575e39ab32ed57cb69bc0fb2d51e0c8c89d0ad3c67306c7f7d43ae444b5f494a7924555aa91906
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b