Analysis
-
max time kernel
71s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
d4a20569b0399001f26102bfa138f26e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4a20569b0399001f26102bfa138f26e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4a20569b0399001f26102bfa138f26e_JaffaCakes118.html
-
Size
21KB
-
MD5
d4a20569b0399001f26102bfa138f26e
-
SHA1
7d8a312b202c9301b0218f714c2abe5d613c845b
-
SHA256
d92c92ac9f46f0757621e8ad0f0ed18e78b21dcc3391f265e269b283b3aafeab
-
SHA512
59a8825d0be9dde242cd9ed273fb443daaace311b384acee7abf78bb23149009e01a5f1ad4eb179cab612b9d768a09a48b741eed99e74d05c1d5d52274e1d508
-
SSDEEP
384:6swWJTGkCRe4zIA/DNixWWVhNdI38lEBKXMtIHF6qCC+kcPv:6swWJTGkCRe8IADIx7NdXc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000075af2bb3ab24dc7eea229a3c19c193aef752dfadc4c1d5fb2d7000918fdb340f000000000e80000000020000200000009c8a473fadb804e95ae0e24722bc4e9875387715831b04b797c62887bdf70cfc20000000351500644b60f6f75c6e2b9f3882eee9ae9848a5707146863c9c67103c5fc9d9400000008b9e3da44fb48535aadd98e6eee526310d5ef3a5b5d25f7462f53411bea7f0abf5f082b151f00acc64078a6a2a396b9b11e3461db1e575d19f7d74c818530c69 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FBF42A11-6DF3-11EF-9F7F-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e64fe00002db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431969886" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2832 2372 iexplore.exe 30 PID 2372 wrote to memory of 2832 2372 iexplore.exe 30 PID 2372 wrote to memory of 2832 2372 iexplore.exe 30 PID 2372 wrote to memory of 2832 2372 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d4a20569b0399001f26102bfa138f26e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5c189f41721494343ead4064116d2a2
SHA101e222b701df8ec06ef84b1d299d2ff3ccd09894
SHA256018676a9011582bf42f25c0369f1c65879ed67fc8805b847ff20566ad3944230
SHA512778477ce48a6b243ad4db0c5d50f11ba9f7a984d4118c44b396dbfac579304109a3468a495d8f14a5c66436f436a816038b12ad92bc920f44e9fcaf44c06f775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538f107dff050844219e82527aaef325b
SHA12a5baf306f8ef544212f5623454694828739a2c7
SHA2561bacb05ba9fc8f6025158f105434a242db5ea584b14a14deeb46c0cc7f81c522
SHA5127ec6add22427dd3c34b3061fdf86e98a402707e77024059ba472786ba482da0b3d75f9b82dad3eabb55f44df752a2437d490de793bd6009bb2ab7bd0ca925354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575185481396d98ee262015f9f6ae6366
SHA174c9eb5a2e20008619dd1f1e4da957e2f6be5573
SHA25627c4ed3c3794e2a941e590abf9246b19b8b66fb2f9cfdb47f1debb6008dc0641
SHA5127aa6649028b099217f62f5e2beb9dc26ab31c6956e6091d29108842779af3f53c64cc4adb19f9a2d6a0734d73a703418430137c50afdec88dc61398a5ba967e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fcf4c99ae99e1e98dea50ad2a33f8df
SHA1bfaac6633b5b99c3774ddda9712b2f8bdf8fb92a
SHA25655a8557e1c88814a20bcdc56daf9e53018b0798514ca1e6db9f53201a96dd838
SHA51263488e9f12b18f598488949d64fcee353683d28b6eb64894988da382e1a8dedac226c404763483f4b5832b32c8402bf6a08c4e98ee22e0f3519c42e1729d5d86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533ce5fa274a0bc7dfd4e55cf3b85cc9a
SHA10c0d7a1a2c7ac6ebc3f158e8f8937e2dc5ab5693
SHA256f4454c54c5af223687e1f547aaa60e711ccf96b5f7023ba0926bd5229781d06f
SHA51273b7b4e846a578296bd599b5463a62504f590b73df553516bea4d70b3f8ede6cb6ae837b69b9e6f45ed7e7cbd5c75e583374786d6006e4d58254299708c2c77c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c727468f8435ef9cab0ca88fb43168ce
SHA12094f27878d8e45045e44c7080e083c118dd2c66
SHA2560eb6badd36dae502fbe5631d03d5a9318f7d972a0d08ca31411fd1044a572a9e
SHA5127f47f57acabccde59381e9752ec3a27b6177df01d6fe298fbdbd80ff93af3310b26542cbfda18c8c44125f817c9fa9ef2bfd3f2702d95d4421b99ff98715dab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef385f8e0f190a0f2fa021595fad821d
SHA1ad232c16c3c3684d318fd67a05931898eab15971
SHA2568f604f994c0df0b4a5c2ebdd95b534f8fe73ddacd1504c254df1a63c4b717144
SHA512a786c45300ee7b2cffe69199987f09df98b51c4b888560bf365404c4e4633f5be7921ded83b4fe57b27cdc3462b4d2abbbf6dfa14009f2493d6b7b9d9095bc21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f1c78776f1c13e9099d4a800b1a22bf
SHA1d89b9421b055076303144eb6678ff13e3fc2beb1
SHA256f86a436eca27f2d34823b0be028ad2158680206026669b684574a9af89d5faef
SHA512c00c8b11b4ef649334b363a7d5d80b84d366eb5c8c5c7739562591d17aa3f505ae0ab74e1aa93128d640fc375c87c84ffa4296f88f66b7143f88c03c052544da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5bc92f4dc9bb53895fdeed273c86fab
SHA1f5546d03fd9106d6b06225ffb03f6811b732dcd1
SHA256c34b8880b5ad968922fc1bcb5437145438abe7c3b04234224d336a3c920c840a
SHA512428ac8f33e79aad855012595bc092b4ae0d5e98f96f25242e0ceb7809c96d5637c23bd79af5132130bcd74e63d1252b67cf49384ad322c92043119861ef30ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cfb536e18fa2746e4103dd6464fc9a7
SHA12adab8023677ba09930d3c9af88bff2b1e9f677a
SHA256bf2b4f41ae85d2b2ecb661fad109ee0e41474059264e07918b6628944e9f4cea
SHA512721beba415e7f6d1968990cac615dd94c14da8595ba75f27028151883ae7273719ed972a60d83c5bafad2e2bc69fc78861eeb9887ce148292bbc5da39dddc4fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2f6c739df6f8d4328fa375284f5dd12
SHA1a63b6ffb9084a75ea47c2cabbed3b7ebc049c5a8
SHA2560dc074b144440309908200d19e2fd7e944d3e4864d00cb3091e2e50f72ab3f9f
SHA5123ccf23591c5c2623fa5632fe237534062ec1a317b0296d1f2ddfc98e575edc327d866fb063d590c3843afde5ce2aa45ca4601919f90b9c931901a9ebb06103dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef862aeecb5dd61d2d53abac9c27dcd8
SHA1dd8d0f3b8c721ff6af034be7ffc37eb1aa726486
SHA256c4c79d3cde7ac90485750a0fe7535564df3452612b6764d9740a149612619443
SHA512df2c876c335782f79b57d304d90bfa900aa8b940228f7a7e338057e85c490a6e06dc32881e3cc9fad9e4262e60409f23d2812ced0e08977608b18c45e7cccb28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e2ec578c3880d8c32decaf01b17000
SHA190757bcec115b9de44ca54710d18b1cc5e2a995c
SHA25643a72fb36d655d0aacf9c9bc1c0cb651a959d0d646775daa9abdee1ab926f561
SHA512a66efbf1d9cbee81265770fe0342fbbcf3b61579a2bd53010d4dea89d17dc6024dd57b2e1b33f8789a39172a2d9d76c726598dd9adeb5114b32ae391d242645d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589496479209303320c4f8d3d63ac3f63
SHA13d31b740cc3c706e1570efdd820e532f626820ae
SHA2565d4aeb280c636d8cf46c9bcff86322cac3d74af97ec6fdd9715ce3c3188644ae
SHA51259b22d952593c89cd7289f9a9da3a35cf74759cc86160106abaf2b69e27968bb78e5de4f4d4671df2bc222ea133f058cfaa55d4842145ee8e0c5e33ed189db71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5051cf217f354765168b5cc8644ced936
SHA112b977986a815e9cc6266b6802bbed203621cfcb
SHA256faaef992c7848497d05114a1e2bb540e3896086c1d079ba42279d26c4e3720a3
SHA5129b9c63cc4a8c2a1c002737f4a08b83d0d63043ed53193e9c229730fec80071fa968f8917761e8ddc03842fa8eaeec954b26d1e0a18fd84f4fa49e746be09ab04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcd945a64cf13e16cd8f4e8a6397f356
SHA1f0feb108699f7761834879f72992f9eb0abb267e
SHA2566543aeeb8a9199dd70cae0b8c2f78ae531e9478fb06aa30997851bdd10f99ce1
SHA51244e54739a2258874c48d5c986e992a37350461557397a8a592851f9a6edb134a906c956a244b4821653208694494a38cdcf324fe62ead0cb1fdaf1bbad3924c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55abdaa8f6f9d0d82cf28c162b1c23a55
SHA128a464effda491e22c32739ea7b7cf4d73d22af7
SHA256a8a4f4ed4d37a56814edaed7c647c523b9341a9aa8fe03178ca324006b49779a
SHA51259fa6d87628b302bb469830cedd9c9300a09ac49eca6b5a342e6b25b76e17b2025dd16d1f10582d47261335f7dea0c72e19fe265935d5ec7f593a9cb2da760b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eabdd6f0686d8b607660760c3c72a7f
SHA17bee301d75d6a18884f3c7b23c2db8d91b864626
SHA256221a2bc0ef757d0d2e5fdc8ba13b3636414c832e097997b2d312c7db34d0fa73
SHA5120281a3d02e60eac3bebf3200c67efef25d9c9dadde67b9c79a65f985151b4253b4c4ac1804e27aa9253420fa82b77daa8465a07e7448731f520a04818ce0ce93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5965e02e52dd83166259ef8d6cde48311
SHA1f0f4f0b65924c8ff7b8034b6d9edb4109a04fac9
SHA256ba0e22325871e2899faf52668c6390c20ff1519f05f9f494ab66905dabb70468
SHA512bba723612a5dfd1338c4e1dd8e727c1f12f49644412d0bcc204c547d70d5c3a2ccb35cff6768114c654eeccbe284d77ac9655a66ca541b6c963ed028a2a5aed7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b