Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 23:33
Static task
static1
Behavioral task
behavioral1
Sample
d54af55c3b16b0d8d8a2b2692b286a95_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d54af55c3b16b0d8d8a2b2692b286a95_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d54af55c3b16b0d8d8a2b2692b286a95_JaffaCakes118.html
-
Size
131KB
-
MD5
d54af55c3b16b0d8d8a2b2692b286a95
-
SHA1
f4a658423bf7d8d60bb9a5f86aad775b27c423e4
-
SHA256
6828a2c10b9babf96396bbd25dd7dfb9c90afc7d62480101a5258443099bd427
-
SHA512
c5d012a3d9babf51e8f1906245bc4d8ff4f314c6de5db1cb9830f7f1a9ec860d5035c956db4e387893567db071b83acebbe9749756cdecd113ad700dbc3e8903
-
SSDEEP
1536:SGbC5UDjqv7X6qhHVyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:Sf1yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CCAB2731-6E3A-11EF-8632-EAF933E40231} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432000297" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0f641a14702db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000549f8ab0636551129a57501870cc9d224db86b31d7f022e8da8e9c8e6c5a3a5e000000000e800000000200002000000073694a31746f407503a729cff8712eb6bd2b1399a2d1808c408f8fc8ab2991682000000074f5942c1bc9561319c49218e377ae7fc9e19773a5ea196e807734966637a414400000000a38e20a7512faf6be216bd9e65cae009202e7d7b4bb95ea74174f8574f056e464b67c668e133038728132c276407a9d01e7205090313f44a379aff6903c2da2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2724 iexplore.exe 2724 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2824 2724 iexplore.exe 30 PID 2724 wrote to memory of 2824 2724 iexplore.exe 30 PID 2724 wrote to memory of 2824 2724 iexplore.exe 30 PID 2724 wrote to memory of 2824 2724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d54af55c3b16b0d8d8a2b2692b286a95_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e52627a004760d63aabdb9581b363ca2
SHA1a9fca10b65928611900fb02915d3eebc6181d8e1
SHA256117079f52afae3978cf1e27c9ccd5834c7869f59293741dbaad0c7774895c750
SHA512f5db9399dae0a6dba794ab50b5d86e1727ee08b095a2ed4d87ee60437a12a9253292754bf65a9f6813bedae420071ea8453b799878f5edbaf90311846391890d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a92822c4f19a95ff75a4ca6e970987c
SHA15ea9189d59c0ce8a61cd2d1d4fb041e60bb141c2
SHA256245de53555b05dca518be648a8b92eecca2a36222d6a287a38e694a7228046db
SHA5124ef467d569e1f2b532de708dbda6908a5d016002ad528c44778f0237d440fca6e5f2eeae95ffae5c2c61a8a80951ca4590782a55482120f4a25529504584753a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb2af4c69a53af9a654b09a7e11320fd
SHA12ac9bcddfb38fa62dec82f7a0e4b38c3e76b931b
SHA256e4ce0933a856b49f407181c2ec94b9c60313dbdafc55a8decbdba34cbea2c47f
SHA512f423946c20689c2035a5ddfdebd92ba01fcddec17902837813c263d62201f4c38ce8b4cfad6df5508d3a6cbb8b275ceb0a7b30e14b6fc408daca1f20064753a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f057dfb6bb67704a79374edce39e1369
SHA15a497c8b1e78bfb68235d8c5a8f0a8b9840c9982
SHA256aeadf88b13968ebd81896a02e2318e03e3cc8192678e5b8eea3373cbb766b1d9
SHA512cbd8eaee0d0d5efd0c409ef4a89f9da5a5ba37538d94e82a326f65828fd312af30de09f9a20a105e595e67a85c7198d0ce0c46f39aa5544fc2c7f815d8fedcbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bcd70b08a9b6ca8ee13ad75eb1cbea0
SHA12dc075dc6b9f7765d82881dcd908282372c1466a
SHA2569fbf62b0d83091ca57c3c4b4615f942f8b9df55d32601a5a39eeaaa39182806a
SHA51250931fdcb372e53756fc9a6e5a9e4796f0038a02984063f3de6ce78c265082fa8f7b3645c1ade5c56752a61199c68117b9d82f9c08a9bb0895e4ce19d3a43ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ace4e984f4457580e245043d489f49bc
SHA1aca341f5b1dcbc3fe769ab3f1fec07a84691cb4f
SHA2566004534352272fe11ee459a3b5bfe0f1a8a13b5762eb29b83a6ecf201f42d230
SHA512e62b642110932a1094dca5465cfb7b722c4db70a5860505742b43b1da3c94e9a64839f3943f383e9aa105c4048ff8457a40890a99f451f8627af9108a40f9684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571394a11370b3ede4c521c52f542e50d
SHA14eec55aedb9f794bbf4062f374f9e444f72928d4
SHA2560036f9f00949d76bc2b604718467f2f5fcde5eea7e299c31499aef9cf04a7d79
SHA51258f5411734d88cb2ac36540a8b409f7c96ecc1a4a1298fb5c13ec6f32b3fb5182bb16fb1b8753258a4be846a14c2cd2c7a8c848a5304a8b25334b40845a1635e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5277be7fc96c9ba3328aa59fb76479f09
SHA1e148a6b43a932e9f1a4ddb5569b472491b922c84
SHA256efda6bc9682cbce9512a04b9f3d711d8478ae1c303792f6b78ea40ff00d44783
SHA5120288366af6b47d7d64812d1a7c0639917240a9db4a0dee3ed30a287a0926100f43d7a4c8caf6c615d3ad9f9ace2ab7f467f17d5b32b0ba404cc8b62e6ad91623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f380835b04416c99fde89d3508f1f134
SHA1994039e2db35e8132e07c5b1bd57fa719d2549c3
SHA2565f97a79e4056bf1c56473be73e3695a8c11875c3998b6212c1b3d6ad47b62574
SHA5128a6050c5f9d0d950bb04be60d67fdf8bf130bc438a306de791abb13d98333eb58a97a160bf05d2d1f64aeb21901246c3b3126d9b0a830b650881ff8ebee9e86b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd45051157b99a4fa3f9ee713443db1b
SHA18ff7c44a351425cc92c4de4a3dea5596df74d39a
SHA25666515da3f7d5e36a253f72d355e198605ddf0d4fa436483deb86e6b20399dcbf
SHA512c4520259bb37f28b846c99212cf08c17528395ea4d7de23ccbf442b4bb7773f3ce077b774df6c697bbd635572fa7c9f59a576d57ce542c749ca906c02a4091bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc04767eb3a90a7399710222a16786ef
SHA14dd3033e69b74f049e467a0862124302749135cf
SHA256d745f59829dca3add2f9ec6927a398a4674292616efc518728e36a5949be866f
SHA5129a20435814693f78f9dc669cd720a01b89e0558080300fadebb67f8600e14dfc41214e18ac769919adf93ffd1341f9059317136bb687ed34071a504c24080488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579eff0faa5935c77a6db662f1439c97b
SHA13f3e810ddd90af7c56107da21aa21b40a35713f7
SHA256b08a2890e34eba08013de35b7e0c7b72610c8370b1860cb27b49a64a8d2c5c85
SHA512b45f0b402d43e077ed5bb977d8de913e458175d46810220404ad523012ad8ba1d63e40eacc51c31a3fe23cadaa18cfe6bc7c7827815d7a7e514fcb34525e5059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc16e8a8707d5a2dfc893c5719264fd
SHA11845ae300c5026fc0227d6d657053da7782822b7
SHA256e5735a6085ed33159842978af23e4675261ee4cd3282248975ef5eca884360fc
SHA512398b7db7f6b9b716943e56cbc681bd3f650f317b9b0bdf7a99f1c1395fd7893e8ebfc1a2ee83c0b5378fc8753a1ea5fc4daca7b4456765f1e76dc7f84b6e0607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5af0ffbd259bc749b37f6088b356abc
SHA12b69a1e492c7237f913a582fbb91f41072eac83c
SHA25655a5b46aee4450ba46cdb95710e971bae52b879aa2b147650d971b7f40298124
SHA512bd0ebddb71acb698ed1aa255fafc94bd3bfee45b6111ae557af7a4b528024d2f414ab2d399cbba38e493f0ea90a1e7083da5312cd37a05a46c132821c6e5762c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54086d2963e89b9a0e83f9946e4625e29
SHA1a0f315dae159208514b5bc35fac2c8c9943a75f7
SHA256200102fd2ac0656ba65df4489b7f299a601bebfcb43d9a5e4b2861d6c16d3648
SHA512c5190130f9c415ea01af7ee3367549d28054382dc81849dcf5b6041e219a059ef228dddc66bf0da17d387d2aa45a5c348ddaa47ba6660bb06c8d57e253290dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523793305962ade8a12ad342436a5fa26
SHA1035ce1e8a00c6e5056c3d296aa975c64b0395aa9
SHA256ca9d18c86469c1b704b9fa9c533aecf5ad4673586fc27a35987cf4e9a48ff479
SHA5121df2f8c3f8a0a134e0b7c64d93bf3fbbde27e4c00f2e863cde38d3948df140f5d55e1228f0043708b1af59357fec70dcd1cf936da362157dd6276a32faf67fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c9fad737c5fb8ec11469fd54302f4d9
SHA120e6b4fc44ae81ea9d7d6a74e7fd72587377a45a
SHA25680331a3400a545d85d880caf6512b4a7154d0b76b29b3931589b0e82fcb69cf1
SHA512eadc23912982873d829c35fa80e0503704b67c24414b98ead4100c88fa75dbae53b5d1384d317953b48a0e903c343f9c6f18faf1b8b1a684bdd53625eae660ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac4d1ce111cad800076113aed1fad01e
SHA1aff62b469be1017ec22fbbfc647d54d883a3b962
SHA256c7fd916ad5c2d8bbc5196ce70ef0e025bc9b2315f8e7c97bc43d72e8a7d1ce46
SHA512b2beab67480b7d484913d9f38f6c1a306eb1d01b19f9a107dd05c08e2f9d7c7d462ceb7e29760f75daa32488fdd9784157db355183a8ce4212805c5b541cb495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d912929c0025b49e493d1746bccfbf6a
SHA1d45d1cc9e5fe9b143c085cfbc9f178b5910fa0eb
SHA256df1efcc7f68ba4eb2ef99f109f0ac38e5444d9c72383ceba0a681ca4bbb270a0
SHA51281369464f085c86cb567e0dd7a02274be36b706559ae2085a58759f73df4d1d577e884ec924c0bde9669693733f1fddecc90a563f983e66bc3a73e785e62be95
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b