Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 05:27
Static task
static1
Behavioral task
behavioral1
Sample
447e5539165c95b30bfe65ddc8ae6e0b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
447e5539165c95b30bfe65ddc8ae6e0b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
447e5539165c95b30bfe65ddc8ae6e0b_JaffaCakes118.html
-
Size
12KB
-
MD5
447e5539165c95b30bfe65ddc8ae6e0b
-
SHA1
cfb542fbb3eaddb55a960a75a105e3d390b95519
-
SHA256
685a4ea2cd67ff4c5c7060a2bd0d35d4cf35a2ba562c91c6a7bd98c9d858faae
-
SHA512
a04920646ec4bbaa0997c0c2606579d121c4e1db196362e0b5b65c45f2ec85161756afea574f0de5d5f35028a161ffbf2aaaf05cb58fb4b8349f1cdb916ef845
-
SSDEEP
384:ln8uqnGDnW0qXDrXLNt3qUMT2Mfaqeu03JFXGHc0oX/cj8o6c2iLXbMNFEhb4t8T:ln8vGDnqBLrQT
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D22BF151-41A1-11EF-B6F1-C644C3EA32BD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c17bc1aed5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427096741" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000001ea32dd2f018fb0f845179730ce69989518932177ef480ed9885fa7f3642b49a000000000e8000000002000020000000f714086f92014ccf9ce021260eaf3c86ab3b8d7368393cf738d55ed82db02a6c200000009c70364ed237724a2d67baab0813157c080880f52e3c222a100dfb3386f03f45400000009f411802b1f57a1911c863e39bdb4d3a5a0325d149ee6b3038e08f7cd68e137ca8082274b99741e653d508452138bb841358a65eeb5194e1f4e456681efa1219 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2112 2088 iexplore.exe 30 PID 2088 wrote to memory of 2112 2088 iexplore.exe 30 PID 2088 wrote to memory of 2112 2088 iexplore.exe 30 PID 2088 wrote to memory of 2112 2088 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\447e5539165c95b30bfe65ddc8ae6e0b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57576846c2ef14d43d466699c1241e15a
SHA160c4966a1d8772cbc7e77a90360f37a14f7ddd3e
SHA25653ec704a51fcfbae3f038b5a3a36f90ba54230d4e871d09eaa4ed48ea3f9537b
SHA512f0c621dcc50cac73a61eeb439021920e532db7637832ad388e47083b731d0a9507c69e251fd2cb0b47ec32c56b207390a9744773393add8753704db816c2f176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bce8892129f3a31f97cc671f97bf1e82
SHA15900e2458a34d71ee5e709a16ca548e8819d0fde
SHA256ed4c74ebc5b97b224ba48dead1073ca4501b3097b4783495d22b37a84ea705cf
SHA512652fd50e53f8fd218f3afe8c07eda4ab4a36aeb110d584a9204645d3c97d843277b80133420293f7b29b07985df7b292f0982f71730034eabd9c1700336dae96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1d924e5a71ec809fa3701cfb8c65697
SHA10365c2cd47214ef04fce58a0c4e411f7cbd3b675
SHA2567e1b92b3090125eac2d01ff65b08e5602b8f395721af8da0d39cee9daaf325cd
SHA51208122239e8e6734771cc740c744dfc2d75449891b525c6de66230c80a3933279f72ef2f03c5ae9947cc0fe5b2cdc0113fc757b077bbd5e8eb5fd5f84552f3212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cd2d08de8752f70267fbf9cb7d8a76a
SHA158543dc5da6edcb65ff7d78cc306e818d4457d7f
SHA25605ddec5680a45e7770409ecf5c7e750121279aebd1207a441db6ba623e64918f
SHA512b8ed1895e4c504e839a068dd92ff90c91c34deb18a8d0f3f6b863879b0287f30eaba79eb4eda7687122400a16dbf2d26095b438cba1f13bc825a6f080b4777c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f4d0dd2d7a430b13e9893e698d96a13
SHA16fcf04f21de78e1820a487b1456e70b2e6c946bc
SHA2568965dd6ea4a7af96775747a9d80ea99e46e73921bf5b3bc3eed18e45f33ef781
SHA51244aa8a1a80fffca52623cb0584a50659817cf23a283b501ba74e0a3d747e871bd25b52294a03a4e312f93688d1f7bcc126dd6edcf0e04fa4e5570b937d2d2bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f87acd7db0e58b074871bb3ab2cbb71
SHA1bd94825eb1bdcd3e1337fc74da2f1a3a1b415d7b
SHA25644d4087c7647fa8236af7645e4f038ddf8944618ee8ba173467f09e8310c2654
SHA512135af211dfee851a82043ef1db29a3e00d28fdc4ef049a5d0a41a885c3c2247b2be19e6990dacb8f7c805f480a4c1bba2b62e58e2c59d01779caabf5ba2cd870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b417e6afd66cc352eba23f122b959c6
SHA1a98de35b3052e077671e78a3b96f9b2a13d5c2ab
SHA256855f76dea46a4fd00cf014b615c2abb65c81f40038d42bef1a4d019dbea493e0
SHA5123c7df62c958ec963ae649a83379a20940c1ad8b054425ae1554e98ab33be867405b188202c3c7f6a34384938e15088d2452c7ba03891a63f21db104b5734e134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a450d304f60346c44a3954f0eac5a656
SHA14b1ecd39db40c5c190d48c61a9bf8e51ed731756
SHA256af2074434481e8f97438f328a3b98a11deed1d8cf6fc675d2e524066c39e1837
SHA5128073e9b5b5d3f610597abaded5a1455cc9529f1ff758638495557be8b5926ddb9d315421c0371689c6f3f535bdeed08735409c162b416f350bfcad44e860b674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d810ae42b91b19f0ea6e37ad427b5edb
SHA132faf657ab9ce45e2b736d92c86afb21941331a0
SHA25672267d6cba1a187f894048dfa111b06b36d6b3eaccf2565f5de9efcd56107566
SHA512fea1eb79908ff681391f447e12c0ed49f0ea0ab14e9a7eb45dc12c3cd4ef7b25f43240311d7b63713a61efd4b139b75cbb199cd3dcc54889c5882a49464a8aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa91e030d6186eeebff4d68ec5769dbc
SHA161305cee56918b0c5295b2b3c8c9407d144ee2b2
SHA25621bb1d2167788a50b5df44d4dc6f8929b4af619aa7309dfcfac2436f7a0b37ba
SHA5129238598d2dea5594f92183e09d6df4ca6a2013937dc8865820bfe62422978b5ca146859faed7b62547c82d1c31a9099f61fe13e0804a5a55256887cf9212c8a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5087e87b539fbec954e39078852126352
SHA12de642274ec2224f4be49a6a689dfff421598aef
SHA2562d77536ac60267b5e97ded878ecb1f49868d0ed0d58c23662e90843fc7baa4d4
SHA5123d5b81594df13462a7b115d7347351b7e651f03b7b2102e610eba433c0c1b238f252b84b1aad23e14c8fa4b442a17d6562405075776c4583b1e960e6990ce01c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db09f7f017ca2930079164bcc3a3425d
SHA14e95457e79fcba040ffac9a4918eb08a42699a9c
SHA2562c35673d12c6d2553e1ecc68b5c838ccec7ec68b2ab879f6f056a7f9b48e66c1
SHA5128de75fac12baa08bb4ea0d4ee1ba18683a44df7b001dc2f16648e437611640f900751ea7c8b1f454c4f961ff0c9879d7b0a756d392e15c67b8b5bd1280d6849c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1fc2289f818e68bf66ea09a7c66219d
SHA1f05e8ea22e9dbce451d6de41a19a7307f4d59afa
SHA256c13c1b9674372a52f7c1dc561ce7220a97d9d5dd0269ca29ddd4a97f031656df
SHA512702bcba6092069a8f4bb3825a98d2aad64a2fd639f79772deb6cd6b5c172cc27eb4de0eb500a8ccabb3fcfc675db77d001bde0cb6eada4f281c3f0dc89952302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5296f263e346e3c7c0965c4a5a567ff5d
SHA1a5b5c07e677a7cfa6a5ec8d7ee050769200f8cc1
SHA256fcbf62918a05603f2a13f333d8d26d39eed823a8b7701f1d2fdf2f8f649efc71
SHA512815d7b028d27f2b0f61454d9cd505b514650e3cd91a526057a7ccaa8470732d055dccac7973505b8ac2585247e8acf3ec3ad2f4f6b955cf6418cdf97898f1e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538c11336ccaefdb3866f4b5c2fd8d5c4
SHA10ff20ec88ca2266d5149e1e509a271296e8ca67d
SHA256133605c65f5a5dadf29e318d080f6c2d3f08c5805a378534376a8a19aeb49673
SHA5125ebaeb78708a4e8c16251b3c6a00c1747e598f27b02606b5583ee23454e0986cc2c3d3381f96753d663a3e386367f92d884f4e4794448db57087a99c37a7edc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d58584454588166119cffa2376ed9942
SHA16f69b9e727dd3e9ad96e594c3528f1c060ac6c12
SHA256950299b7b429a7facdd358eba3a86f16e82bc61a8b60edd7d215f80c53f0565e
SHA512ad5b4086e99c8ddd121230d033fbc35739056452909859ed4730cac344fdf5cabc90aa682e8689376a213a8437a1a3cf354a503a94b5f0c431d64d0cafa93801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ef8ed1258553a3db33665353d3fc116
SHA1c8c7eb99c2a8298c6829382f0d6d2a5c5f4ee6a6
SHA256307643c22d5918aa56d32849b6f8ab776a6dcfa28f97911b12c25d27d2ffc291
SHA51239cc207029142f19cf0bd6db35aa5029d9e2cec71d70c6be82844f9dc5e4c1bf824e56203a2a30e9263393112a5e15469a0af356436b88027ccccad759b67e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543a3b896f52b6ca7e654330a887c7990
SHA132cffab29c8e16524a3ba5a92c5ea310f6bc75f0
SHA256d569bc24355181c372f0c9de15e6d833a69304fd6bf04acc2da18cf7e8fef2e2
SHA51248c0cc59f8eff0ef37bb3c993610e109e677c0afa6831c4db5ee19737faaab423b2e896e798e2bf33318e934cabf2cfd65564e5b5efab10fd7b8727d6239b33f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b832f920e2c4bab998c59c0dd2ea0b1
SHA13866f9dcde994683dee4b4688674a8c4c5b16091
SHA256537d43581e0bd73a884bff0ffeab25e15c1b16686a06bf4ae881d4e8958ba01c
SHA51286ab820b30a6a51b06d1e8c9e566d9572937a4e5b599385f5cf92f01ebd100394242c8887a1153a6c632b2304106d5f23dda7513db2263478ae950c6f1c3b964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593a7e882cbbbf45d94b76f3ee3d110f0
SHA1dc86ca10ad83a98223a208c573b939f39b42a1f5
SHA25641fe377951b54d7f1b178bf75e2c5826bf28cfe24f608f8f377bafda0164b427
SHA512fb67c047be6b67855e8aa6ce15dbd0849b0713ec57b3f867e97bc92a2719a1a89e9e0329b22ee3ab81bcbd9ad09b1f28ef77562c7be9a3e21a5eea309d6a74d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57be152fa5ff957545c026f257ed48a0d
SHA12215d059c4c1cd5fdad6b714cec1acd2ebf8e8f8
SHA256d2e49435b4fb4c9b2a2d0fc8c343c41e98e7f3e15f78200a474fb1b45ce7a31f
SHA512a94074451258ccd1438be1cc47cce5ba829ce0c92b6f2ea80018a51517fe3bb6623e8006594f5939511d0d0190f1c223451321f2328581bcf2322f5e28778ec3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b