Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 06:15
Static task
static1
Behavioral task
behavioral1
Sample
ad229aa1d1a2d8709c2fa97fe3f61d8d_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ad229aa1d1a2d8709c2fa97fe3f61d8d_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
ad229aa1d1a2d8709c2fa97fe3f61d8d_JaffaCakes118.html
-
Size
94KB
-
MD5
ad229aa1d1a2d8709c2fa97fe3f61d8d
-
SHA1
7b838bf5e237945f164c195238562e8c1dfb3a06
-
SHA256
e12e992f82bc7b4953376a78e6d42f8e7ddeeaa3e40b15b1c9bc7f3dc5b30797
-
SHA512
b64ed2ef4e1585f86668934eea7310bdfa6f8fb748bba8afe73e765f9b2485759b6e0094b350385cbce0d2125fbf9495daa690262d5ea41eb0521a777c1185f6
-
SSDEEP
1536:WMLiNirGf+B7LV4ZUnf/KF03Uzy/eFLFWZcRqy+BdkrY8mgHC+qpEyW:WAiBr8BdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000009c7ae2702c23da53f3dc5f035fabb3e93873eedb52980fd4042d0a9b1e01ee7a000000000e8000000002000020000000e704c6723f664999ed613a5aa974c5d921db1a1db5b6b3be063e1b3bb6192311200000000aa2364312f4c961df688a583d4a9af9f8e648eafcb1b89aad61f2d5237216dc400000004dd72354a4f42c6f48dfd45d79b6bb42c5793cb0319195ab54bf255b9acbf73024b06b7a2e8ce514791692458dd6e70e19f2139695a7aa4d764454a0a96b3724 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f20d8bebbeda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424594013" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B227E501-2ADE-11EF-968C-FEBBC6272832} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1260 iexplore.exe 1260 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2728 1260 iexplore.exe 28 PID 1260 wrote to memory of 2728 1260 iexplore.exe 28 PID 1260 wrote to memory of 2728 1260 iexplore.exe 28 PID 1260 wrote to memory of 2728 1260 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ad229aa1d1a2d8709c2fa97fe3f61d8d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1260 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a25bc9f7a178a83b4ba23a921a7f905
SHA19cfa1f7b7a9363e5a3e219e133c1f83899944e0a
SHA2563638eff17be352e73d0b102f4a9ab62004ddde92dd95e6ea6b5b425d1fbb36f1
SHA51270f1bc920f66c2e77c5147e592ac1f102ffd6f537e6d0bd40a4dd1cae6a5956ad9cb1881b0096de9d91a78ef513eacde059b41bdc8209b9c3844ab8b087c548f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5903ee15158834e43f6e4cc7acf65e15e
SHA1c32109d6f6c6b1e9e372783734db90e7cc3f9b93
SHA256b8e5a8e4b46917f631135655ab520ed43cb64931b9cc5daac820ebb182b7e632
SHA5126b955d76b3d53d9c61d455ff8f0451a934e9e975319732867bc344eb3fbc3e1eca384179a34a995216dac80299a64f04069e2b216d2b6fc3abb025878b93c30f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a07e09fe1ffae37870793bf74b74faea
SHA14781c86ccb270d22d5a572bd9ac1db07c5d1fc9b
SHA2564c7393cda7340064c29542bda125584c6159d1ee1a957e03162d298bc53727f8
SHA512c56b529739c4dd374683d24bf062e24a809f77c12f53c5bb0f19f85a415c04b9ef6c325b83d00cef2e29c9aad940ebd24bace89d0e28a16f162da6d6970e3c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a615f1d40c6add8eb20893416b3647fb
SHA18f1e3be6730e549d3337525e7eac34235d5c9141
SHA256cb648f51304e7e996618d0707d24f6d7ec250d83f8c991eaa39a1e79b39aba6f
SHA5127ac810196c606fa59fcb186fa6e0856b6e98263d3fdb76109f3eb61497b6ee9454736dbab0aa65923cb06c18bfb0d59f57ca96146cfc842fdb1da787843b4ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faab4ea1edb6589c362bcf8b8351d313
SHA18fb5c8c4b2d068a89ee5780859bc2cdf0d2aeee2
SHA2562943451a0b3d91ce4ccff8763e3b265f8a1398d116e04448feb504ab6c3fd7b5
SHA512999d7eb0887c6b09a8b8195662c63a525ddf91e35d84da612242cca24025a3a3a09da61f023d4006392c5d76c5fd0c37cba8598b91a2dfad699e660411423432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d02e8756cee57eb55373cfb027f58190
SHA13019b7d71d5694e7b74614ab667ecfe0ef31c6f6
SHA256b400e1419ccb1dd817ba4dbff1d742395c9e99bf08ef840eb1b3597b10c24f55
SHA51251a129fc6d3316352ca2bf994b6b30756b68b0e1381e3dd272c8359f46a603db5e4edbabde3c270896f4e73eb4690cd20a11f4bdcf8fbe7cc3c261803f7e1317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5016ae96877afd1abffc682947f088954
SHA172c0e84dea19fc228e72ce6217915260ced72a8a
SHA256525bf06cd3f6ba57b248153d74fa41173fd0d851acd498e2ce77c7c50bee067c
SHA51288c7cec5a6aca349e34ba680fe760605278778ee21b3f65223edacd2cca883f8b3a6c1fd0cc5c18429f12a13ca27608bbc593fe7fc27a98193d7849f14456a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a676aa32fc7053bb2781f6f4c686605d
SHA1231775913139419c2d292a310a5504c42e993996
SHA256a2221c9b7996202b8428ccc66ffb1662c607a20c4ee35daee5dd639085a0141a
SHA5127ba88d18d50a18be02361f5a1e01cc70e068c6f5edc79add10bf48dd207c5aec9f0e9acd8d076a54d7ee56aa527d291ea1040237ccbb81de4e29ffd9322d9a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd75a0d34ecc48cae7696152fee0a014
SHA13b12061eda8f872de732e73d2dc3e55ddc921a88
SHA256b0b8e325273085e3f4deab4f03e6b32e513c21bf7b486382253ced66c3944bb1
SHA512d2b701d1f8d9b1ec15bcf77f140b237be951790064a3c3c2d08eade2014a809e4f048970ccd77504f85fd99ade9cfdc16dbd7dcf8f48a80d60dff803fe9934ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593b4d013d8e9197ae66dab23e8724803
SHA1fac4f595d9a737f0b4e2625a3b44c5d6658fb82f
SHA25668a04e9e8afa8caf87a0165d877f3ac6e5697d06071e5cbe5e4e3ed76832ab11
SHA51225e5e9bf69b377d160a98c96e0f3a7f498d6ae31f92a96573368fe79ab7193e071f24d36b05a11a013f235b737df1493af3d51b7ad4eba4e4283f1501d96052a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dedac545ca989648e56380c43101bf8
SHA12b15b45cd8bc7bd84c662033df7a48f59b82d7b3
SHA2560abd1847504d44e5eca8691cfac1b4464221465c0db758c336cd7cb515d9c907
SHA512f9685ac257ae0758103be8c003a8af9d71d57c834d8ea158a61e519d4860fa0911f5f3af0853c6d2e4a17aaa70ebd797a89ce4d45a5aa3eec50003e91121bd4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a02caebaa615d9b6bcc734cec601442
SHA18788449f41861f7206238aaa8d9beb1c5da36be5
SHA256c07b6fa8b0d993e5879e0282b23c3ed4669d1aca1daa22f725584a3c389eb355
SHA5126e3268793eca9a72ac2337c7ce2cfe7f1d30566d82eb50daee4b3eadda1250d3d8e352d7c1fe7df58e59379508c1bda7c4395a1234415999a1eeda258cec5374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53676ac46863384c0ed8f75ea12b22c32
SHA1a4d6ac97c8725e3d22c71448201507a61525c692
SHA25658fab39c2733fd2c6a2e066fdefb032b6b3c7d7b58cc2388eaf2731ef740c2d3
SHA5129fe43e4c705ccd66968884b3485505b6399954031dbc1768aa31a7171f55e9a6a2a6caa924c2edfe00d1f13426f5d28836acb1260b3ab023a19dbf54bb5403bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f14addba32224d22c6249433c7e63813
SHA1ab42423d15374c13f622514965d3c277e1d3ff53
SHA256b2291883369a5add992358620521eec7ceb7776b39f65280bb26d5f2fd5c9ca2
SHA512a5f975a72550d4feb1cfb31a3ee7d9aaafd2b30618db7b40fba50b1266a2e148bcd474188bd9d0ff2fbf8face5028f97e11ad514e2ab818ee6385c7283b5f6f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a034a44498d2e51c8f9b5d318638b75
SHA179532280ceb7c177763da089de98a3a0339e5e3f
SHA2563b7e1f97c22dac8d3863490caff7f47f86f91b3e3d1ab0322bf66c70c1c4d0f6
SHA5126f3dcdb3c18f4945d579fe6d57cf88336b53eb28f74446ffd6dc53319c98b12f9c64eeafa6dcacf56f6faa2371d43a304948b9cd5120afd3bb7b8ecfdf1e508e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f80ff40b54901d7fb7bcc37f72019b7f
SHA11c63c95c601ea8956b15ea70027f49534d770473
SHA2562fc480dff61a38f7914f21e5b415898793635b83214a5fe4837b1c2008952642
SHA51263fa65ae553b306043787df5470113102ddf8816bfaa18805da5e48bc07c7d39a056ac92069a6bf75d168fee8995ad814ccae138b74845caf6ab3156d20913fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530af962963ca41cb7e13f8f0d4c58b17
SHA1cc6e84d11b208edf51463ee4836f515efb15dd20
SHA25627e079fc662ccf5f3cb771520a49b658433c6a88fd62f544320f24022978a80e
SHA51228bdcdcd6255b1d20ef75f3030185b05c52f3197e17adfa397dcb5e554820ae4315842e37459c0ec4ac626110f25c48e3936e00faa285fe194985b8a1288a377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7b2b5899e7063638429c29a88db5f1a
SHA120e91c71b32c525911d69248edcc4fa665787283
SHA2566c7597ff8c269f03e273737bc00d37077a0b3acb67945492b6b947d68ac667de
SHA512aaa7537e4eb8dc23eb75d176c7128f2d70827cc9a182534c27e6a01020202de747c62222880579ea0c21c020473a1aa82790fbff24ac9ba540bd7b94788aabcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eee39c7ab6641204acc063ff9c81cb2
SHA1e74b16103384839898bd3c5cf5c61551ea7fb761
SHA2567145011bc96f368f3c8f2894eafb5c140b88f0a9f82eb8434ea383a98535b314
SHA512b9846749732312be2d5df94b6ec662410d6233565e3b2405c0d4649943c62a0ae44f513a4bb472d0937b264d53bfd74faf6e45e12f165e2bd96fc88a64a58fb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab22303dfda72d22ecc4710a5b84bc97
SHA1371183849b5f61cece0fbc861ded61ace8345819
SHA256ff76e36896c0f916903992f5013cd428f2ceac528afce4b605a9cfc1d9ea7982
SHA512ed858c3d01afeb6a2c300c5db608a9b3c08bb62ce9d57ee0ac04197e877f48561bd9e71ba66be9eaf2f6563a7845d55f3b1e794b7430511948201708991e855c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\075-Stadstuinbouw-Zaanstad-icon-400x300[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b