Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
6abaabd3f14e0a4433c5f6998d873103_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6abaabd3f14e0a4433c5f6998d873103_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6abaabd3f14e0a4433c5f6998d873103_JaffaCakes118.html
-
Size
47KB
-
MD5
6abaabd3f14e0a4433c5f6998d873103
-
SHA1
cd29d56795cf79a6415a2a292c12edadeb4355a4
-
SHA256
9020096300ede2dd96efa12f1b095da260d6d57ecb5e6447019b0acf1e1dc484
-
SHA512
8e9a0ba48879b5f80a9decf0700ea13d0056ff0d101c1482fa0b18849fdd707574165f759ef71962552637bf45ef0b29960348f6d55dcab84ceca3f4701fbf5b
-
SSDEEP
768:mSHSSSLgoEbTsBp0MLObyA9lzhxGL/JkqbPn2zBHxpU:mSHSSSLgoEbTsBp0MLObyohxGLqmPn2C
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b000000000200000000001066000000010000200000004ca16f6867b17cd98613eead9c18fe241ff7e5e09b29b08874d53cd1e164f899000000000e800000000200002000000093f73254bf1af726054f965a3157bccfe89161cb3ad93904fe3fcd385178fd122000000032143cbaf145979166c60f5e5013d9442db73fce940f07cccb0c396d91517573400000003f5c53714dc2813dd6f2098ed01716c5be61c9d7fa3306b23340b0c8d486afe4fb00259860e8eef2e686221140522b9a4fb6380c25e22943a6428587f0b4837f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E8950781-498D-11EF-9B29-FA51B03C324C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427967798" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2025eec29addda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1864 2108 iexplore.exe 30 PID 2108 wrote to memory of 1864 2108 iexplore.exe 30 PID 2108 wrote to memory of 1864 2108 iexplore.exe 30 PID 2108 wrote to memory of 1864 2108 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6abaabd3f14e0a4433c5f6998d873103_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f68a410c35653dc45d95af1752ae9e04
SHA1209d4fb5763a17fa8f7a3266c9a530a6d339628a
SHA25619019bdf379d9bfa1096fff97c801305623dc7581a0aa9affaa46bdc5add24a5
SHA51245676feb680cf81fe9c5ee555d5ed57ed0481056b1a45c097d857532a824b81d243ed96481a9e1c970c011afd38629af54c05faa8da81c3efeea62576dd68712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a612b5e0602598b084fb084b366dae
SHA13b304fafab5271070139c0e72c81800533aaa617
SHA2561e834c92a37624b66a798ae39acca8ff061c5924d0b2fa240daae30a790f6ad5
SHA512320e190629c39d0350ed281f815c83b9376449c09420c1824c156b48dde70e5794ec1fe9a34be82cb9c5b0db21800d273b646cb401ebb985615bae071600f72b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7e0c7b61e95aa5074c1be6628407317
SHA1de945c6e72ce776f930dfcc84cb139ffad671ab9
SHA256b9bc0756a0295165eda65adae4479d4e13300cdb3116c6387b9389e44e7f4014
SHA512f2041bd2cd5eb09fbf740853b9e0acdcad9fa8505904b628981d7d9dbbc9e69af3972dbbef94afdd2d96eb75d4ce0c869bb005184a11f340ef4d69e8ea6981bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51039d048f4152dbf2d04d022a35044ef
SHA13710ecf4a79786070981f644f2397e61b39e5487
SHA2568e4fc117cc8df679680009bd782ee536f848b15c0db9f5ae22f6676adf1a8bea
SHA512010f357b286c51af257a2b6086aec0b37fc4ea21a602f149ab17a0acd5f1abdd2b908a3cbdc10215a14579c6ed1fb2b163ab182e311cf3f8aa21de73ca336a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f77c6f413769eb9146d931338154652
SHA16b50ed243cbb9d1f05c8ac1513ce1550141dff7a
SHA256d8eeb2d94a1e2680b80e3b16b947f4266c427edfa98e4b9544bd62e62fadc328
SHA51212d3ead37f0cbd31eb01f3c2e223e41c9b24ae1348a24c0e10d28bf777c596809c0061084e7f2b74662e2c7220529c70dd7e7269215b8c5581f2c21e3dd783e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5863afc76a620c07bc29e70e302a5d012
SHA12f1f35023a23a47bdc99a5f4bd51bc5583bd27e4
SHA25688a53c7055c7c35e96d264983b0949813dc7a307cd166adf41b01e17ee76b5f9
SHA5127a5eee098996d40cde12b86f73b4883090eccbdee7dcfcc995ce733b91bc78b4b550ddcd2dfc4e434e50188bc354e42fd797f5aea1d4df11c2ec21032402c326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5993cff49c4cdcaf8e9316f578f2a5587
SHA14571962a7b65e65501e0dba8cb4d2760e9525e7c
SHA256af00cad9755c6194b70990e3b6ad8ba9e6ba6d1e753b984420e336b04850f798
SHA51226823feb44e7513eb064fd768ebc1ea92083dbe02f1d5a08423bd02b7f947757e86c70324fdf5e8ce65a47d94e37a9dc42be2a412cd79fc33fdb34a80648888b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5108466a4bd1db262281afd5d9b7795d2
SHA101d2323a308f625561533c57ef9725a44337fcc8
SHA256eccf649a410420f091c63a08d50ee1adaa1b0225c2602b7f3f4a704f987086b4
SHA51279ebb6c5063ec748b9fe3252ae25f01ada584c8c186ac0e776a85034be980c42e2562356d4e050f27e7ebf0a59f3bbd9716dcbdc9dff0a45fff24b32ab831969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5951fc634ad0d7d6c725a243aa2b172d3
SHA1667a6d924c14f131bad0efde3340ba2b8a913523
SHA256f6582517ff1daaf08cccdda2fa1eb27a0e36036a6e07e938884e7cae6f1f19d7
SHA512433de791f3d233304435af45cebca881450b22049669aff1c3ca6bc79fe9e27328a5c8957595a4e1e25d74f90b445d8cce4cc996c515ba380a528a0318b449f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528589f9ae8ecdd50e14adc24f2a16732
SHA1dea43c918d83a5b25a6da2b6d3dbe9b9bbfa0e5f
SHA25627940c1506b6b28b380efb8f7d40a464f4582e9048ed005414c43370dac84e7f
SHA5123e8383716aabc771d735c150329709c0812c282becda97c65c5b6322d28d81cb482c46f37b59cd30bd66737b1f854d34330f4efed1be14f944a1a0e03fbf0338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fc14d9b29a0af6ebfea1e2da386d860
SHA169ffbf97e054c98a95c6e7bb5366731bbbf48f88
SHA256c37f70366d29794bfca86b6086016f3424c5e2eed287c3901487b31f4864495f
SHA5125dd29e7b5c290b62c1bcfbff2cd6821739a7abae0773e1ce964cddcaef4ecf675e29eb533d7b6d0b921918e3a888786440929d7285d090382638641c812bbc13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594652bb489f362239fefeb482190d066
SHA1e560cab85f86ad30f049d083fa52c5389f4ff435
SHA256c574a0c16d92830650843557fb07cdfe1a709da5fa38e3cd3d886f0ff6ed057d
SHA51232de48e8d627c8868cccf4dd9e321eb1d8de4023526e3a2384dd17881aecbbe3e0def69f6f40e724de3183057e6e39625973d0335bd9bd6b561f040a85efc0dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5279aa958dd465183244b6627f0c5e0f9
SHA10704aea7cfb41c7e4cafea34257b098090c7f7a0
SHA256e829e3e7d1a90fabd4df9674d3456b65a0cef0e46329772430bbf4b0e1d4fa32
SHA512ecf2982fd37b0029add9ca76c0d02ab16665a11cc0c89cbf729c5e3349762d4012e12a7b02407d187fdf114db52e6872a80a2c91be80f1f0bd3435baecae74a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d550e1496ffdd567226db9450b172ff
SHA1431d62fd50add95c744ff52e6891de9e6112b73e
SHA256a5080014631ae7169e1af9165915ff2e0202aebd62de7395fa7216e82ffe4d77
SHA51268a3a20f17b94598d900e5be9b6c98550f29458091ce8d68db60a06acad417502503d77778bebc7cd8d6be9cc83a13dcc23d7d38a1ba331980db17d9fe261035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a68c8ce1cdb0a8355441b5d048ceb46e
SHA19b62863aa936a3654a0632c0981570d8c587bbfb
SHA2565dc828dcd11ed17b1e716efa27297da2b7adf604fbbc5c6f7dfe8116a9bd764d
SHA51279dad39bfb1ae97eff83452c5d461c78b74e7ee5a4f668b86202a099989b52f434a9fef69e9201c97a9c9fd9aed1d8f9602d344ee0989f326cfa0d549eacaf8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb24b09d697d12923a5dfaab3b9aba9
SHA10e7dfe65e11af3d8fdc579f9e2b859e479c91d53
SHA256e6df2aeaa6398ac7e61cde2adef05b6b1529e71f31f533ff34e5713fb2a7b9e5
SHA512a7de74477e618a0578529d1c9cdc9a4e55e70302581126609b8e8e709409d38d0a7b00c5631031972c702a6ac83208816c010f70eabba68045e1351f7a66e869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5517ca1378ce92503ce36247043d9436c
SHA17ea133ad1936da09aaf8bb6c55bea513af95f81c
SHA256af5eaecf9f1ad908a2ec8eb867fe793ee4a837bc28eb77b657ef1c3687530927
SHA512e0286670a2603c389647665f9efff549d7d2d582c6e699835830a2fbdadf5035be7ed7debfc02d15255abb91de4904126ba9b844e6f2b357cbe447736d1da863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a0baac98ea42e978c1c3fa87bd968a8
SHA1a8cafd4e0553f02111fbe09dcf703853f4431bbc
SHA25666059a357ddc7441e3ba04ec37870e7e6084b2e9ead3aee561c3c076ac3b0ab9
SHA512fbdb3a387d77619e14dcf6187288f24e3b99436092a8f5b23018f5c2ba2d4b2294398832cd1c6d768c7d5f0a49d52b365eef4d0aed8d390eb81687e99e97dc88
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KJ834MBR\getonline[1].htm
Filesize36B
MD564b61f312cf8dce4fb28eb751b01ca03
SHA1a2c70e8bc138120ea35886135afc3b458bc9f38a
SHA2567efe917132dd8733c47958b585f640115b23ece525dd4acb041de089cd6ecdf9
SHA5127dcd4544c7d88afc8e369e30d05d882fb829671679bb0ca9f5bfd19d1a3293ec8897c64e2d73fbfbe723294945dc6b1b27b352ec932fddd35cfc91f845ea2402
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b