Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
4a14c1233148a74a56b59a9735b39da2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4a14c1233148a74a56b59a9735b39da2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4a14c1233148a74a56b59a9735b39da2_JaffaCakes118.exe
-
Size
129KB
-
MD5
4a14c1233148a74a56b59a9735b39da2
-
SHA1
bfbcc5a36d2f3a1f6ab88031c04763f1b5692156
-
SHA256
9fc355ef652e447dfc05f9d447cb1e719f7584721af38c871e1af2f0e24e8814
-
SHA512
39da63372210473302f0e417153bc467399e48b687a58c3abc667d1f5ff2b8d03eaacace53bba6304413cb2724013359a2903c70d8223f053f3f77499adb0879
-
SSDEEP
768:7cDeFStvveG22DNK0XwbulNtvQqLBdpjaT4dkNcDhdCNxDRqCEoJx8ngz8PEtiko:ISqPlDlsqdasdkuuxntJWwE0lz3fR6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{438DE6C1-42BD-11EF-B4E2-F64010A3169C} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427218479" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000007e9f4ff09c66601019442f5c9336055e57f6f8403f1b6c08ee174b328d42c24b000000000e8000000002000020000000e7fe891226fa083eafc0199fd1b91daef311b6cdd68f1597ca13083730a5fe3f200000006ada2added1c09f73dea9373791851cefc6d8ce3e04c3773d2e7cc28838b086140000000a072aead25ad4cb3d36336779b6ae895acbe81c1924492ffce08562ecc3c8bda84269058a57ff0f05a1fd364b2c12bbf4e846b3536255c463eb95f87cc8d91ba IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 804cfa1acad6da01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 108 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 108 IEXPLORE.EXE 108 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2500 2172 4a14c1233148a74a56b59a9735b39da2_JaffaCakes118.exe 31 PID 2172 wrote to memory of 2500 2172 4a14c1233148a74a56b59a9735b39da2_JaffaCakes118.exe 31 PID 2172 wrote to memory of 2500 2172 4a14c1233148a74a56b59a9735b39da2_JaffaCakes118.exe 31 PID 2172 wrote to memory of 2500 2172 4a14c1233148a74a56b59a9735b39da2_JaffaCakes118.exe 31 PID 2500 wrote to memory of 108 2500 iexplore.exe 32 PID 2500 wrote to memory of 108 2500 iexplore.exe 32 PID 2500 wrote to memory of 108 2500 iexplore.exe 32 PID 2500 wrote to memory of 108 2500 iexplore.exe 32 PID 108 wrote to memory of 2800 108 IEXPLORE.EXE 33 PID 108 wrote to memory of 2800 108 IEXPLORE.EXE 33 PID 108 wrote to memory of 2800 108 IEXPLORE.EXE 33 PID 108 wrote to memory of 2800 108 IEXPLORE.EXE 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a14c1233148a74a56b59a9735b39da2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4a14c1233148a74a56b59a9735b39da2_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" ema.gov.ge2⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" ema.gov.ge3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:108 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55069055993cc2fbbebdd69bcde452f38
SHA14888ca1e8c7575b7f43fac5e2a292bcbe194083f
SHA25684086ca5c356b83d1718decb0afe36c92fc5663f0880e571a235b45973fa031b
SHA5124cea5c56da92ac3639c8eb50bba701f289c210809406173836f6d5ac672932f2c56775613d8430369266bd9e5cb84f9ca82f3d2307da561c50da7abd01d75d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5947d8412f64099639273e825e1238886
SHA1030855e0f80cb50df972ae3603988ebf23a27064
SHA256630cef18263a99ec32cd8db9da3c150b9a45e681dfe7f09822cee41064d39451
SHA51268fc4dac8d8e13b549f859bc1d01a4682c33b5942b54e7c631827dca29a38116d4c56cb5e9d8d4cd39d68435d18447edb88355685d300965eabcaa4ebbe37a7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b7bd6458d22f9e3d64107bdf902e193
SHA1a725b15b21857e512b81ed2932972956c349c319
SHA25654ba36a063bb522233e60c090ed929b00986fe8d6b8a487106a77632f54798de
SHA51278916fe04f41f8e081f94681c1862652d95213f2ba7424474c3f46119a0d2c78aaea7adf787043804727d41e263d00be28f67501bc9c08a034549a1fbde55304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fcd46f22697fae0770205e35a67bd5b
SHA192075f665bb422f01f8403dc7909f0522ceedd1f
SHA256de4cb6ee49393f39fe41fa73874c65e04017cf41fe79e67d41bd3c77c426a73f
SHA512a630860a424e0c6f2838d4bbc7170ba3cb1f73205c23aa566bd9a3f90e701a7c5512579cc12891620e62e3adf470689ee3832408485607bb75fe658158f9bad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c80d54dc264cc6ed383201ab56821e
SHA139832cdeb73a3d44fffdcce1663873166913665a
SHA25658a48fdbeec7f23576d150dc213f6606bce8609b9ed4639ed30a3c11811d979a
SHA5128e5223db73ae77b31da0f3533a736d957eb5b358b31ec6a64e44c1a0cf5adad5030d9d5c82a967ee8ecab4d68aaade28babe4e690f5c22536371f2f17dd34346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568b58afdacf444571187425a0a80a7fe
SHA1b47aea5f096e205f7cb9e33e3651c9638057ddf1
SHA2568a33a17ab2f534f10d50b0a18720fd1201d872a1e64691cf6d8a0dab3b177cfb
SHA51270b87778a228708c0d2f007b88e7fb482774b65bffb7897cb0ce4a7cd5af8bfdd2eea5bc3a14333ed42da60c38856fd01ddca84adcbb7e01a4dc200a07cf7580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528c3f1158279be9d0941f6639bd57012
SHA1569a793b5ee628dadb826e31c6c6e6e7a91a4126
SHA2568f2156bf8e3f5feb7f0fb42ab73b8a63d62720c1488f3ea17ffa8186af7d4874
SHA51247e0573cda0584f280005c3c4b9585106ae9eec3a96a6557f5f9f60150531d61f5e711203916fcca0d1ff2b21c2c2530a93bd4d4421c6302fee1e940b47d2c72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b065aa5b9d101aa91eebbd0c29b72cc6
SHA1424c5dd6403ab59364a9401105f31ad037b48c54
SHA2567cfee142cf0c9ae1a6030717ed422ceac6b3d4594c77584764d9fa93141aceec
SHA5127c0addc4a946ee52b1561e58d75db0bbbff31f1bfcab0dc0e11798d49355a7b7c453bb6e9a305927847078c148eaf0f83cd039c0ee69fc6c30be5de98525051b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0797e25e5c1f37ea257508053d61018
SHA16df483b90a0a8e3329c4407339838d3215df0da0
SHA256e513b924f1211e997010b9168c124e96230a5a84f3f4c60ae40282fb71198ba8
SHA512cc7248bbcb7e48bb1c1f42c564e42854eb8989dbb74a433c63e5f843758cd123f2190a9f01539ee69bb0263bb1c428f63c6de257e85b5105c9a3f8811f57cdcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56672e22de70b98b07bd9858e029b90e2
SHA1878d5e8acc38f08a9f70ff038717f743e6d978c5
SHA2565ea91501324e5faa33ef702d3ebeb3bac770175bb292a7fcda8a08b006d57fcd
SHA5120ddb18c322f8f40beb20eda45fe31b2f71c74717285ddc913dc1c6943dee1f9299ef1f5036df43c13b90233303b82a105d1956fffa9c6b63f5fde3047b8f929f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bc6fcda6c167806d5a13045937c8e7a
SHA1d7b3ef06d716838475447900eb9d062e47a77a60
SHA256bef349fbcd9e93528298ef54083559628226a7b9eaac23311e413089d5536482
SHA512611d78166383071441b21bc517612f08d1b831974134c3796e0e3361135fcf953a9ccbfdef847f119e720baea96c8ac440d38632737573921a38a0b41b88df79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a23cfa7ab917a1eafa5b1000f0bf1c
SHA1fb2626313313846cd82809153134b2257b20886f
SHA2569e847c6f7c718b621732f41431e058efc45162597687eaa8454ca413c9008f3a
SHA512e70837c1d57ec9644c894841da497fa239dbe24e91ca962bf2deed484f04ba110c67405ae7fbe45787206eecc5c26d8a99f1a2f720f94854fd5d3ab6d51fd03c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5372af109ad8651d22e3afc84faf55df7
SHA13b1601541826129df8fb198aedc28a822b818b0c
SHA25636dc668e0bfa8efaea3f71cc94baa105881e35a87f57096433ecdfb276e7b8c1
SHA51250d3271c8dd2f073f1fc491d31e0f9764df161e43c0fed42a7d022db3e778cb5fbb90859057906314455221e199c54cb031f8cbc82a614e950dcc17020b56d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b65cea9ba8ccc70b5a800ddde752bd24
SHA156f1cbd4b3de8a0d51d70c0e0bd28c0c4a5f6f3e
SHA256a61d13c16ef5c832643fa9d66d9fc049fa93cf16a6f1baa12068445228619818
SHA512f43196c3d97d7f226703d9ebbf6df6053c35f54b1b649c3244fcbdfef2d091447593c14c337e44d801903ae1c6e825f19123a017884b8b64bda0066c48a75482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9265480ece1e5085916e34bcab9b685
SHA18391f007a92a385696654cdf68c26f27d6d2e475
SHA2563f0511a41fa96ad794af4c69f897f83862aff0c3e5328335eb7b701a6f68f6cd
SHA51215a621f74f9eaea41200bbfae712c82478285f859b0686b16969b5a40c2dddf3fae2ba3357fc65a67eddfc6dd2719cc9ffc2f025cae52c5b87939e59337a974c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c7902db9fde54d8736b4efd47804b7
SHA136d565a4ced9d142911fc277b12d1ca4cddaf964
SHA2564b2189435859948d0b2519e3e172905fdc22ca9aab54bf008167df2a8b1aa962
SHA5125f391fe6560ed63d29a467945684beed8a851c62fa2467e20c66496de72b07184a8432871daba2deb8ca0109a271f8310412167f33c2392106e12642ae796613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516b2ad676b7f9c37b4db2b2f1f5a67f2
SHA16cd3138c9fe369181d19530c080a0bb9c4793385
SHA256c85965cade8ab018dc5d4805694785d283b48be9c7d8e8c09500fcf5ac24c6bc
SHA51231b261373762d86c21ca806b680784487779b5427177e28908fc2513125ec53d1823935d5425b21b35612f711639c8f3564a4c61ffd690c25d16ba37bfd0d116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5286b2f55f89b379cde3cb1415863299a
SHA1e71f0513dbe664a8be5345d2d5baa8391fc80167
SHA2561a6b487ab4cec0703a0aa5d04c14d6af19aac8212068b663599f5afaaf417b39
SHA51291f30ef0334e67e3e27b32a3103c4dc64d0957327362a3673ba1a436fff6ce190142bd7d0af078fe196a56ca325ea9160f9e65d54aca220e32989dbccf58a2f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506843d7417b7c4c8bf117886879c83f9
SHA1d7dbeee589772843ed61195ff594dc8e91127829
SHA256250adaa775e56fc0c6ae56949651b9d08b77417889a7d7fdd84cf22cde7f0a0b
SHA5127da2e06967c80a6947abf20411d59fc1ac345817f0a9c93a4cf1fd734dc1ae2ec5a0c5bd82ca11990a7ff8618cb92697a543817a9a9280985515c5a669f9a12c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b