Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 08:15
Static task
static1
Behavioral task
behavioral1
Sample
2dc09e133869bd198f768353f7dd60f9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2dc09e133869bd198f768353f7dd60f9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2dc09e133869bd198f768353f7dd60f9_JaffaCakes118.html
-
Size
68KB
-
MD5
2dc09e133869bd198f768353f7dd60f9
-
SHA1
247fc1108c555c56a41b8b10defe93ea45c51ab3
-
SHA256
6d1ada23ba21683e8860c375f3b093694aa23a54b7b07345f77e59c97b423c5b
-
SHA512
d8eeb2f25a1f2681aaf9ca6d1739b57cb381797bcb7002da09b19c2eddea25baf427a691d755f1217bb2b6983d239b1352e90684ecba2a90a4be1c06175679a2
-
SSDEEP
768:SM0hqGbIiP//mdvsYSgLj/DVWmTMYq8Dfr7Vq3t40MSxjfLD+PHgkyMrj3DZ+/Vy:S4Ik/XtnwOHoeuc7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434666242" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039a8eaf709584542a57e97cf23f43db600000000020000000000106600000001000020000000feee00c7c1c54e431630358f5bd91e20f297b5826fba3f5cff5e26a65f631d53000000000e80000000020000200000004dd63e4d58b8e3a90a180ec70bebe7259e0827008cfd0faa8259316f0c2c99de200000008a6d7b7a8b42decf6a81bafb5402167f5b387f0d22581329e116a9052abdaa164000000006fa4d59e7a72b9005239e99f5b9c381e1493c898ea4c765e6cebfd99fa5253977f9bd6f120ba784f931695c41b186d423d1c848683f97dc098bfd3aba3cd047 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EFB8E761-8679-11EF-B4E2-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039a8eaf709584542a57e97cf23f43db60000000002000000000010660000000100002000000018f9adbb3836840628c7f0b7df76fed9eb1cc79673b219b3197dd4918e9cd0fb000000000e8000000002000020000000aa9b9c79d25544f5a0fed38f3634844470f25774a8e076351ff8baa1459f59e390000000827d88b04b13068d8265d5a4a6f8a8ef8ccbbf24670286cdca9a732e03c0be3cb1cb64915bdde32f758b4a609e7ec5c0d9875e419284bbca40137d01347e40920694ebf1bb6e15f2f78f7c7ed47bb5a27f56c8a63c4d5df4b6f2f08da2bb48c11b2f2b71d2460022d43e193cc55a023a6703feb72d6396088303759b0c835d1c1be98aaccdc81045b67434d8e251fc2e400000004cc4e33a29735cce90fd226a10c55314c99fd09aad990e8a289badc0f0bf1bf4712a5cca13804a7e98fd9da582d478806c6dc31be7fd05f771902cfd4e3d50a7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309ee1e5861adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1780 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1780 iexplore.exe 1780 iexplore.exe 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1780 wrote to memory of 1744 1780 iexplore.exe 31 PID 1780 wrote to memory of 1744 1780 iexplore.exe 31 PID 1780 wrote to memory of 1744 1780 iexplore.exe 31 PID 1780 wrote to memory of 1744 1780 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2dc09e133869bd198f768353f7dd60f9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1780 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544857aecf445f7ea182dd49b0f619468
SHA181de7b6a744a8f302a109561d885b54e0192241b
SHA2565e420e48958c7fa17342e421c4be882204f7b1774e71675a800ec1df359f12a1
SHA512796d74c0a39e783c3fbd95b0e36372ef9e6009e02778ea18f8c2b49ef16ae3389736bdce1c88edaaac631b56fc5844b6826f95e78159826bc9271581128dcff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d551931a9ab0ab5554b417df53260281
SHA1de0f468bc983c9bd27b1382234b1b7b1a0689fee
SHA2568e89a9a9a4ac81196757cef8c67a0139a65b0667b2c6b08c8a5353fb4210239d
SHA51269d8215044b5092ccb88e76b82299e3e7c0841f3dbab283c97cdfc2f7d4fe51f1a938a7ef048ab12097b2fb99d7b5907902a528f31782ea0114f41cb2ee75ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520d415c00a04a4fc168e809723c905a2
SHA1fc37d6146590b4be835dc8581a465247249719c5
SHA256d00613de5f48b0e1ceababc307cd2ac15a9670497842ec654f5710930d3a90dc
SHA512b1aaa98b0905ce74ab6ef963727dde6461e08b50a014dca16463ff940e91945ab92d849ac1033d916b5ebf8509752b8a4977e56bb8901d9397a1b369d5892fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508219a0b33a437a933f69304a5dfcdb9
SHA11ec5651c3c4c7d8287c6d606df193b55ca752d06
SHA25621eec301cb51b24228240968cbe5e0f5ad2a7e05c61fd6510cc522baebec9063
SHA512b2a19336168e90b63ff9a96a19c1d23e24538dcd3d93553951d99d4f17d2ce894c82ff0d2fa1b679f96c8bdc5ffe89805c059c3c45bca16610b36fccc060e311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5700fdd66f4df1f4e518d33439b98ee5f
SHA10a91383b655317d90909cd38aa5ec70b715d68f7
SHA2566d54ec4c4b38970b3cbcc755e1bd4caeb7aa768f35069660951c57c44c22c886
SHA5126ca1c7b3e250f33adcf9874b91f53662a80d44cf6cb43fec41b7282e40baaadb834dada5cae6e6d8ca0ba97bb17b2387babf368520eeb0eae8890dadcbb01cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547128c4fc2d83ffa147895d6671b184a
SHA1e09490ba25b0a6497a5c758e98f972dc7148b7ea
SHA256c71947c1f7f8f7ad0460bb301bd552d9bf645a1f9745fdbda1579adc29095048
SHA5123e34ea3b8c8a0d9c20b109f87fa7da38b391a259310c95742d124e214aad0f30c03f9bad4b5c48ad7cdeed8a7b9d0da8456872ebb847a7d47b101e2843e6e56a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a27535ca8c1de38f56abfd235f3523da
SHA165476f6fa8fb0f17f9c3668e87086cb2852e4301
SHA2563682f5ef68123d6b15d1ecd27a5c95d317c99ca86f7f7876e1bd4a7e62e73eb1
SHA5122617933fa8ca244b799dec7ca62ccbbcf9c133051cc31a342e307720f91510980acfcdf67e39892d23580a0f142a8180453243b4133e4d843e9903eda75ad65e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db1bedc0e38a1e6b6bc30158c573ca98
SHA1744ac5ed8b13998c56435355fb64c2c756fa7102
SHA256fb259e1b0953a941c41f6b1005c571cdf0108a0ca524e7862ea2ab31c105de1d
SHA512d66ff54d2e4efa29920a69a0572aeb31c66acd90252a9c77de53c028fa926a23262c66e078e1423a11214c58d7b8066c8516285aeb1657629ff342cb680bac32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550166444e4e1bce11dacbb17ce024674
SHA13a4b1b5d4d3e325fdf578e0625c4ba2f635236ef
SHA256578c6fb372d5bb1fd0b7e74601724fb429c6da001bf84b90cf64a4fdf299cb02
SHA5121826cd2410c765bd3f4b87d6894ca7cc736593738ef4ab6d5117ba85159c318a94112c46d648557181211de1c107b08b21c9315189a549dc75e493d8bf6615fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbc16163243367b7e63aa98330cf0f36
SHA1dff9d619bc1e94bb89fe541557388947447a0603
SHA256f2379c65763dac1d42651fae50b17c41bf5622b3bfd92d6c14a76f5a711ffb18
SHA51248220d4b9542a71c4f40ff9e046317261731f32324be8e1bd18e8a83539139090fab88e2f8251e7ed7b6924286f5c9a39b567745b497ed2f02f9a3218c698651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5626ad2d37e5706ec3de73c10d3702b17
SHA1762225db1537364e06788f5a3c2d7874ce3c4252
SHA2567b144bb33c8d57f10d3dfac7237fd2d67b15bf981475d397d96d608320de1489
SHA5127eeeb6b669d1a4d1c8dcd907dcfde555eb6f8e6265afa8dc0d1e348e00a00857899251beea31797b3d97475541fc392ead518740fe8ffe7a3ad2b8558d091962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f4e2ed7b12961bb5afc4cfdc8ffa9fb
SHA18973417bc6df625de1221dea47150301c8e1e34a
SHA256f2474ca7aafd0390cfb84f1d65b68da40a7421745485e2a0e9b8d7c9994f9c87
SHA5122afd7c1bae007c3371c6fbc7f61a24c2cd4c61e2313bce396ef5f7384c2b9761a82d2f0599b28005ea3e98603dd5f666a85c7e63091b761be0876fb76864cd4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f8f421064be6c2b2a131904e2c9e376
SHA10b0e38c400aff3f74d8fbeab8a270da9683479a0
SHA256850f6f04d7164d4b445b1b351833fb05e6aa89dd2ab60c43576c2e44757830b4
SHA51274729197ecda2f4b83fa35b2c5d6c52de09c728e5f9c94a121dd67091ad17290fa3672693dc44f0a8b576b7c7c3df1f6d8e3aad29ffce7d7ddf7957bffe7d061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6afc6b86454f46d82b9ce9be8ba9bb5
SHA100713fa98a717579778d6fb8dacd41482a67eeeb
SHA25633c6a9ed7c881cbc1f73df6a6b126c4c66fe161986081957a6ad8f421954845b
SHA512f6092e7c2e9b952da8d8e67848a0c2c5a72e9a04e4abdb288c0b78b2822fc08cb65db66472165e7d74a1302588c0ef88e259f0c0991dcc6114215b3975beabc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d954725b7414dcd184de5ea442aa2cbf
SHA1974ccb18b6017dfe03563878c3568e388eb3da0a
SHA25678cb30eec358316ec0cfe0737950861adb9ecc5ccd85c8c9e8e7568c8b2fb032
SHA5128882d077cefb4c69b94da7fdea938bd45325388c8e4568d2e21c9c08cf0d97e2bd0ad24eadad04d41015053847c4b0d613e83f1bf449538e9aea3e7eb19f3fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5459e1238f7a411f43f334b960b9641c6
SHA1f42629f71ccb5fb54789bf109c5c58ac3eb9a02f
SHA256eec5ffcdec0e4c86b2c2069a0ed25136d0fe46d35b69dc2f4d5bd7aaf4c69a9e
SHA512abf766a677687b52246da2a4a369384730ef78c801fcc6ab011e83f24ab334842faf9b000deded5977c59b6a92b1969aafcf0d2279225166f3eadbc879022a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588931a578311efad3da55f23c366a690
SHA1c1974d4ad93cd0fe99898d2fee62cb9218ba5395
SHA2568d509386b3bcbf453996278cae49bb591802b9cb9478c4c78da0f9025ace0fc1
SHA5122425d5323f66be1c94494a065dd3d47154821ca25f553807e53861112f18954e0ddefabfefdf3752293876199bce3b369b649f7aad6e7421cc95bb719988ad82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554ab90949dcd3100a145f10cf78fdd0c
SHA1ac709b86c0f76e5b7699eb74d4611996954a26dc
SHA25641f075391f9c4b044a2cb0e45d301576b178822a37d5520452ccfb243b0636c6
SHA512bb4d51953169425b22ad8afe4094a9ef88330b2006d726e3baebc89bc27c58d26755f5445e963cda8b20fb069a88cb7555c9771c6112d32f30b52b2923279ceb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\ga[1].js
Filesize45KB
MD5e9372f0ebbcf71f851e3d321ef2a8e5a
SHA12c7d19d1af7d97085c977d1b69dcb8b84483d87c
SHA2561259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
SHA512c3a1c74ac968fc2fa366d9c25442162773db9af1289adfb165fc71e7750a7e62bd22f424f241730f3c2427afff8a540c214b3b97219a360a231d4875e6ddee6f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b