Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
127ea03510e8d59152d49a402062ef9a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
127ea03510e8d59152d49a402062ef9a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
127ea03510e8d59152d49a402062ef9a_JaffaCakes118.html
-
Size
139KB
-
MD5
127ea03510e8d59152d49a402062ef9a
-
SHA1
690c90c09cde8e16c4fcedf45e4fb9e465f44426
-
SHA256
746a382ec351606f46af68faf75aec2619b4bf4076c276fae826de48914fdf0d
-
SHA512
cdb3fc59f860ad841fcf625e37c24ca59b94c689b439e9b18797be097b7e90d52c23769248ae1f6a7e4c1b267e4ea40c3bb0951a079e55bc937136d1d9df2901
-
SSDEEP
1536:S/NlED/6uGJ8yzylsyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:S/FyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434190627" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FB1E031-8226-11EF-A1E2-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000a5d6c7d33681663a5cacf46220eaccc7d820c3ce38c8f800fe9144db75370f3f000000000e8000000002000020000000ce57681ca725c9808022517c2eaf9aeb6c5751af9d5214ee6635626c7083cd5d20000000098d10512da17a7c70de5384b378130719f22bb08794d65c1dd042855b49160740000000dce8a5a13672e48f68d3f25cda286315d6e3be86c13fbfc0e8bb24ebf356601326cdfc7d0d2711fd197848ab5faeca6c196e2c83f1da1cd1f1f1863fd991b7c8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50fb0fa63316db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2860 2644 iexplore.exe 30 PID 2644 wrote to memory of 2860 2644 iexplore.exe 30 PID 2644 wrote to memory of 2860 2644 iexplore.exe 30 PID 2644 wrote to memory of 2860 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\127ea03510e8d59152d49a402062ef9a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b18a3da772f75c42f1e431b77638c8c
SHA14a293147d9656291bc38f446da1eb21339d6e29b
SHA256ca0fe47bc7214ac06c1530c6d032601f3ca9c7b141749983805b5aad9181364b
SHA512abd43a96c4c7b32a9dafabeae74d78d3cecc1ad7c5ab959581b721a9b2405757d41a73f5fdfc6ca6608ac6988f0bc5f0859108bdcd6cb192755dc237453e3b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a471d20bb51a1627c27c443effe33d4
SHA171e210cd4cceeb32d5695faa60c52bc2b2ac1151
SHA256d415ea6316fa2c997ef8bb1c4353aa71a466f038d3dc4b103e7cc689b379134b
SHA512a6212c3fbac88862ceba88e2c24b66d6848d2405ab6deb29932b16f73da17d684e674cb24a71803794a63c887724fc63f5509a67d27d33c933e71a4c281e409b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc4cb5ed123efbdf7b35f14568099179
SHA1f93f2124c6e14ffd278a8922293a29118f407fbb
SHA256cd6769a06ace5a205cdde1e6d94f087e00b92f3fad6f40587c6f3efce404600b
SHA512a65116983e7b645c3a13c32ba76ffa01224608eac3cbee2a0e0b8a9a6ce7ecb3be6958904b30bd924631c441e7c379516c5e718ae4e6e4ff6f34ec4c9801a0e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa7facc7cafcea96a868dd968aca5a79
SHA15f563d8fd070ec1149cca7b5f53578ab70883985
SHA2565a3c6d4f444fba094ebeaf80ce8c9e2787636c9eb796b8d7cd59abf6e4022cdf
SHA512a7835f89c1f7511d7b246f5a1935189ed788b058087fb99c3282979448101503c3434c370b77bccfa659da9765d52519bc3b365444da68c41dc451683ca6fbd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fabff4d667c6fdecc6033fe6952e7bd4
SHA1fa6c5f7b9e1e91aacec2bc75eaa3df2ab8f45bd5
SHA25630810e5c827f2e372f8ae30a0ba2c1f1fc6e42970d9b0280918ea25b20e136c5
SHA5128d7e8907fceeda76e9ca12eeafc9fe4ed759565e4e78f06c077eb2025394aa3355f45714262f9e3cfb9817627c0a1302783306eccd7503589c41e38561e256b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3e59820033dd4e6f8a6f0d227938057
SHA1bb5231fe2cfe34f42a4770df1430b6e0955d2e35
SHA2563bd6e4e821e11d0340dc27c9eade3137042df7ad880a21ff59d054d33c68450f
SHA5128b779b8b348e012638f51108aeb176ed75e5c7f45b01370663d95bf91d1fef32523317624b71d040ccc50276268240ee410ffe9b0a1a590ed028567a1e6eaaf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511b029209a1733b1c8390fba43da3f7b
SHA16bd52e0070f744ef145e7df9cc26fcfbd39cfbd8
SHA25658798d24b05df4079076f9df701a213dcbc95562452c1be2112da7667e03a530
SHA512f2e55b500b4074db278562659f73eefe328d96a2f1f2582006c657d7df5d25c5f700e903546876930de85227bbd89b76a5517947575d2f9bab95d9ac3fc8dcc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538518a5287aaae3bbe06158448dd98ae
SHA1c37c582c62b8bb7f42278a8f3aa2a5b75a191ae5
SHA25688530f8e2e81218066aee084668887db3d85d92b6d02b2e7de79c9b4c1138003
SHA51265fd711fbfe35a62313665d6e1f6493bd04658dd1f254d0dbfc35b58a612f667b3f9288a9c5ba9d9f189b4813112975850593b333dc805341ff5218db9f431be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e6355d928e69c9e639d852106501550
SHA1c40a2c8fe57e51ab09a0eac73b05fa985ee9c8ff
SHA2569044fd5a4c015342a5fb3024ef7a46b0274b99c69073d0acfd47a7a452186308
SHA512c3ae314f3738f66eb051ef74a8b2d4668560548578d8be0263cb8981aa0a4f33906bc2ced4334a21213197ddc32e02bc3068be1ed9abe57a0907b14e4910a07e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b535d46dcff1db9970f043605e817cf
SHA1deaf74c532ba5ef573790def3b9f4d585ff4445c
SHA256b5468d7ff9807df7647f62fd855c29dc493ad57f54493e99ac873331e23646f7
SHA5124b1ce5743150c0605e4bc3f3563c929878acd508c4662373c5af4a5d8fd72ee82a47b6b99dae2a4f6900a45df8666786e4d227570f391a3cb1398cfe1c6899f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b707421300540fa3c1829b3b6020662
SHA12d37eb07acf2bd58d5f90c02fecbc6a4033aa64e
SHA2562ff5631a9c8c7304964ce65e22422a533976a3288b259296ed7826b319eddc2f
SHA512685f3fd12aac72e27e26681d59d54f11abc5e070d5f9f1444ab89c8c0c08957c0f6900508c89dab04a18c6e70bbee6aca35efc51cd0d26f6501d7e62209bb39c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524d9940bc572d9a0db3da34c6070f22d
SHA1198604ef0bec40196f31a25319f5e12c906118b2
SHA256c09c4dacc13616aadbab9ff7ddd9ec0880886f75f41b3215d8b7a85079f4806c
SHA512e815adb0c8029e82129e0e080f4adff000ad66cbedb27d04554dfbc58509fa43dcd36ba78060c44a2f3ba7ab3505b18df40ee9b472d56fec14b4ae01fe850d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f08695d95d9bf812040f2577a11006d
SHA16d5564b1b8319ebd5b21f7c7f64aa9a9a837ca10
SHA25662d0eebb8f2e3f6eb254cad7c09fa20a1e1dbff04d733c4fc25708181a20be51
SHA512ce6c15ef7e9f8a3446538251491734be999d82d896da7485d2d67c6bcd382d566b6e75f5c5b8c4112b1bf5207e585c76c6576efb04ce02c6b822c7630c411ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b9bffa8c81ada18e6a457e38ad69d7
SHA1df96553cb67ce090a861dc4b3f39738308cbaae9
SHA25621d47c2962cc1d12e1b9a1733318cb08341572d5cf4e55df4f2d99423607a2ab
SHA5123b654285d6656509133648e997ac7de13130b8190aaf6478bf63fa926deee24ccc9e311a417bd527b0bef575f96766666a0df57e8a543e341c45a4a1d69c3d1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b2c38015d9df697e3c83ed69ae92509
SHA194488a1cadac7ba47f0df84d8e1fe7b1e8dda4d5
SHA25697e930a59d80bfc1c7655196f7597025495b2e04ee97e70fdf12c59c7e07c41e
SHA5127b4511c7bf8249c4ea5498195f67b98da576c42ffbedc08c303b2bc7190f73d81d2c49f139f8d173644c290169750b2d4c0f52d51d38201dde88600cf661c595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dffff4b20127ffc4d35d30abe74e2b3
SHA1367a9b0237815d92a08ab1959ee17d708c91b7df
SHA2564a887b3b59211e0dd8ea0e4bd8522d77fee2085c3646606dfdeb252d526b032d
SHA5121614feef94c13a0ea231828a2b4dca26721373139bb3c543fe025130612400c38c27cc0d7325da1ecafe54ffb9da05c02727c451677f30c9f458769ec2465f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5fa6a39ca626f92b730e25770dfde8e
SHA146bc4a5cfe92d9ed3f515d28581645083d0eb2c4
SHA256bbee955976a8fa40ea6c6918cdb65a624d693cf16153d1a3db5a2af36c1e2af2
SHA512968df2e2661bba58232059e14806707f007f52d7861817a7fcab92f7b8772863a466f3e420b1fc3c6ea05cc6d2676ea28ec91b4f841e955da9ab284570dea694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfa636a8dee6145e9f6b490fa4f2432b
SHA10c1b7c6a8062a25ee122956093651c9e88901050
SHA256f65befccd030a4d2cfeb0e3de52c1d66aadc7233b48362af2895bc75397bcb23
SHA512145e794ac7d64189620b713246b3ed9954fcc0c178df888a8e2fb2ad06c475e7bd95a8eea4e0befe3d90206df0cbf78fa5491717072a0f24c746d42f48debd87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d69c106a8e0f63c1e153184d517f5424
SHA113e5b9f405584e2ecf2605bf15cd3540ce12a713
SHA25648d65b6c8e5872b2f6a92be0de2bfb0a3a9e02aaf38f6bf26cee9739d240f432
SHA5127b4d569776c1afcd74c0510f87ec21b1eb936e40213b6d9ac39d7be8952a75e3485c09433f059af439eb241a6a989576b02946cdd3096892595114028b2b58f5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b