Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 21:20
Static task
static1
Behavioral task
behavioral1
Sample
8863bbb589f9ec22d69ba8956d2893c2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8863bbb589f9ec22d69ba8956d2893c2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8863bbb589f9ec22d69ba8956d2893c2_JaffaCakes118.html
-
Size
463KB
-
MD5
8863bbb589f9ec22d69ba8956d2893c2
-
SHA1
f407be67e0042edd28ccdde1940059edff281d8a
-
SHA256
aefb305e707fab0efcf0fb3afd4534f25b901bf5cb1cab4282c3c9e770251a15
-
SHA512
5bfee4fe4328e5d39cc3db5175356b243de7467c63c605f2f8625c92cfc3e9409259f0f726f0c83b8eb93abda6af9742d0912b9440d1066dacffa5b230ad861a
-
SSDEEP
6144:SWsMYod+X3oI+YCBsMYod+X3oI+YzgsMYod+X3oI+YLsMYod+X3oI+YQ:b5d+X3W5d+X3A5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A5C7A1C1-1F93-11EF-931A-4205ACB4EED4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000007b8d27537595c6a9f7fe79b0914da4ddf23008ee7f48bf363e14bfa1b2d0ed69000000000e800000000200002000000019523763ab47ad1c17406e76847ba2fab3c80076a75e4f66db7cd77d5c02b2b420000000527d26528742c9e4bce7d4646721bcd1f38f7e8ac362ae0b7d75d14e1e96262240000000703f4119f7f0bd797b073cf8daa6c844c60eadbd0e2dd80233985564edc571e82a412efbbe579d8e2bd090d21891a60b9bddde400e4898eb0e1171924d505ba3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423352315" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0cb517ea0b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000008fee10fed00760e21b24c6d6032962a03baf962ad43dc629a00814f6a94a71d6000000000e80000000020000200000002768145d5342bef3864c818baee637ab94818eec4503c2029d8e70002e1f5ccc9000000008caf14ac7e01be643c119dd67546e9cd789e858f60e44580229abf8eabba2fae34da87d0a3a1f806cb92c6e7e590fb204d952ad8f7322e1cbf145e72c65cba551a0bc56dbf2a7ae953f0a64e59c39cff64df85f3011e419f087b9f54222697dcf9a761791854cb40184799dc1eb4959d316f19ce5112d32c1371c037ce21983417aa0ad604ad3e12e037b5de2a1dd6f4000000063772f8d6b014ab9d49fec93a9f9a1655c53cb3375fb6a6c213bd7dc8d45e086148a97ca360de38880c8225d943aeeb7ac3e62780890ac5c0e28039b788c97bd iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 328 iexplore.exe 328 iexplore.exe 492 IEXPLORE.EXE 492 IEXPLORE.EXE 492 IEXPLORE.EXE 492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 328 wrote to memory of 492 328 iexplore.exe 28 PID 328 wrote to memory of 492 328 iexplore.exe 28 PID 328 wrote to memory of 492 328 iexplore.exe 28 PID 328 wrote to memory of 492 328 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8863bbb589f9ec22d69ba8956d2893c2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:328 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d441a986f9f279a9624a3561d19d7f15
SHA1beba4e27059b5fd0b1f4c295d9676a35ac1fbb6c
SHA256e930098be7bca59ef94d7dfba52883aeeadffe89bc2b00697bc41285daee16f0
SHA5126cc3ecf61a0336e2ed02d1d5239f13b7860c4a2c0942bd8f2286378040b6b4a86747ccdfde8f05f1c19013358609b379226fb22fd7952efe2398196d9ea2c948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f90915bad09f86041ea0f580307b630e
SHA186f141ab526714019f4f37c7d8bb2c653e819ee0
SHA256a1c4c1832b41563f45a90e654f0f718eac4b6e7d2d451c0fffc2b219abc3a015
SHA512a2fee5ba97bf4486d97f6eff9a3dcea48912d3fff8e23a66818f269f2f55c31aaacaa88626381d1f81ffc8cf9a7ad5d9c56060630cf4a59a51323aa466b6b0c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df8409bf9678a02ab648bcfac589e6b1
SHA13985882f6ee81b64297b8846ba405b9ebd3b1913
SHA256b70d088fda352de69fd6bdb33eec441a72c8ee37364aae5c6121901bd3ebcfbf
SHA512f7589036a5dd2adde1184d4f58eed20491e4d90ceadb078610db4b9ad0481d5c83bdd6ba3ca88071ea1d7efd4da4906e46643d1d52d17e73c75225a6791a78b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507ba1e2ab47e8c210fab08b6398b8462
SHA1e850bee86e9a0435168a550927c7483044c3f173
SHA256883a265113638643db7dc01ade02328d398d605dec6be98287976a3ae9a89af6
SHA512304f228cfa5a59e5051ceb2889429987e558e02223265bcaa0e747287a932f696c2c30af5a7127ec775a68af38e97dd9c01068a2cf2fcd1bd14e949adce64230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cd7a40cbdfcc73ccd63c1f29408f22b
SHA12f204418ae3c8175361c688fdf6dacf80535a2a8
SHA25613ab2a3017dbdb61f518a0a22691dac8a3bb2a21186769fecaed5c6347e4d453
SHA512ea78039ea6251f0e1bfc5d0b5b125ff2f4314ba3d3ce3eec123788b5ccd5203add1c6b706d7a538d4f8bfa5df2ddf7f9c0d029be07f49bd494a45d9f2c00d04d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553b11bc892222c1847a12f578e54f559
SHA184915da8f11f5b01da1ef502e093b8e94e82a36f
SHA2567920f29a286e396167f0261c572dcf81502f944c442e16ad697822b20e492b7c
SHA512ec5d12116a95b8b1ba5bb1caa7747cd8388247385d3d681508a43c75d450d6c76ac8d2a84fe88abd65d5dba4becbfcca91b8f06b513790607139889e2f78649c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544762e97ce94bb9a0e3cf031bc26c910
SHA1fdf1a484ef81d79f94e1465c07c29511239b01a8
SHA256a9c548c12609d748e855c2532e9020dc091062158ba15174085261081f01452d
SHA5129b7a08abbf0aee5f72e7a411b7e2916448035e1b702e6d03f0338b7a8e93365d6885d8c4a2bc4d7b6a7c4d79d3cc72238118f4c93c479d60011e25c9db894c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512ac4a3406b281a9001477b88b3fade4
SHA1a8249c3f5cae66a29457d3643a08215804f67204
SHA2567b266f604c9bb754359ddded6b2776b3d9d7838a2727bf1285b7c9f1aa094613
SHA5125caaa50a19d18f0dd50f93688f7085dd42ff0c6b41ccc39dba0f7e973f1aba97f643418e8112b979ceddccb1856480b176855c95c04fd6585acb1e3c15777565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5698d2683a217963417bf01ed575c86c0
SHA185c88495df064ce39c165682f992079796b98fd9
SHA256eeb7b4a4cf66dde57e04fdc9f8e2c3974e0a3c604eeac88d07760fdbab3ab8cc
SHA5125629bcd09dc0611fe22eb3c97d88b8822b1e9fabcafd61ccc6814479a0948fbbfe9c354b723d8338931c375e8f0ebae00a70ad835049c31ce360f630d56d9e4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c3077d1ea77644805bbdd18dbad15c2
SHA11d1948cd11337135aeaa508697de47cae26fcb00
SHA2560d349b3840a929e529b1c5894ca61ff821c6df9546e1b5ec279a7846523e387f
SHA5120e3e2580e9729bcceae0d092ca0072f6948e9835e75bae9db5c5597019fc6b9b3e0749df893e502cefc67f3b539392df184a1753b3b559d552021bfcccec0235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5770fc95be894b86cf16f5153747efea5
SHA16154d0262646399c23887116fabf8dacb212b4b2
SHA256b1c96e3be9fa7dae12d9f5b6714ad128240019a7fec820a99ba817e6a35117fa
SHA512782cc8e3c7103ff565beb37d28aaacf5e446a4c9e7e8c36d6bf4d7a51d23bd7bf35010ad827f140c319aa19ae3060ea8d80cd9203bec46a1675a6ec207f472f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52deaeba2019bc6455db100c93da8f8c0
SHA113a2c4f5783badf15210715e05eef989b20b4811
SHA256239248fcf1acd1674c992ada34261d0f3f5660fbea965d619a6e428efdf80744
SHA512b7e923cdb77362a163bda69940e190f34e4b78cd77f06a9a0c83277665d8fa0134746f3eaf180d5878cebd60e9c1bba60bd2c082c1bbda3f689910b40941ed53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b926f3092f57095ebd86b60eda671917
SHA123b49543c61f4db4255f553c4044f2460bbc01b5
SHA256db60567250e079e29f39a4992a1bf2f0560604018884981a780b0f607fdab289
SHA5121d809293446ab65fd02182d53469276f88e0720ce600b1fd9d50b72c2b477214db3de4bced7afd3df73d01b59829b46711416056320b69251886740217b3ab56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae8897bcb7a256dec2092e58ba44c85
SHA18edd2e314fe7ababee948c173b27415e552bb82d
SHA256d5c88ad6940a3294d7d4ef3bf9896c19c9f3b890418d797027cdfa7b73b7e195
SHA512b0fd148430c293672a3848e9834ca8cf1b07d3d18607724ed8c7f49ed894ffbb84aacbf3f1b1f459793a3c39a9f51ddcd0e6c665d13d7eedad80c0523535a47c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe958eeef64727a1ec8d0e8c1e13417c
SHA13809d881d6a1514863ceada6f002d9d583589404
SHA256972322630ee7a653130d4a0225b0565536e9772ab78b98e145f38d652c565512
SHA51222d3c06d8f1545b5bb1d9cdda849c1d1d8d0a0c6305c077573d55f4150d6c65749916bdcf108c0147603f7c40ee6dfd052afea368a6b222dfc6f0fe97b3750fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534c2a17c4674a17187149bd5086ef265
SHA12bd53d571a96893e6eb95cc9bc9ba1de42baec60
SHA256543f739363d707767f2718c657f29d099c456f94424b42046c5e5ce7636e648c
SHA5122c468fb93debe35f5846b5361060adfb36c6f0cbab1661cb9332e4c656f7f6e1483f1f67ae8edc471bd45378d5a3878ddade20c0bf49e395ab122396b2ccb3e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d440a14921dd6a32a642c6ad9dfd6079
SHA1598e0885437f56f15d5cc5c1626488743a204051
SHA2563cef1852b6396d085f204d17bddd38a970e1ed941e639ffb4e92cad691545f33
SHA5122a9a566a9907668c7028299f36e4adc57bf904ac04dd1423a6666c9d1292b9e74505fceaf04ba5c1b97f8f7fda4368cc919ad05c39ba3562994e8e85f78e2acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed686e412e60d63d8c9030a68032f1cf
SHA13a3cf01d4bbd9d521a762324c551ffa4ca4a476d
SHA256eacc0a97fe87b7ab9dfb1e8c23c569dadb6b0d3acc01ef562115230b1e047455
SHA512c1a31e4ecedf8bfe57c4a0ccffadc0c99b94b1d49523ddea2bb3058a63379dcea2632ec52272514e9b58340662caed02ff64ab980518c1516d730f3fc112fdf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0d9510d7f1ee22c8f0b09d1c3d09718
SHA1ddb190c68b9ef8aa587ec672fbb53d63b0d56f73
SHA2569b39597062eacbd83d600def186cefc3652b22913409210d499585e266055975
SHA5124bdfbc890e566a63420cb780c335de62af84ded6c5a7c798dfa00f2fed05ac52726e6ae9bbce5fddece07bc7b5e30e29393f97b74b4a4a02e0ed6077c98499aa
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b