Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
dc9bb59600a2e3f6fc0089658e50114d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc9bb59600a2e3f6fc0089658e50114d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc9bb59600a2e3f6fc0089658e50114d_JaffaCakes118.html
-
Size
13KB
-
MD5
dc9bb59600a2e3f6fc0089658e50114d
-
SHA1
6824a25168de91bc36f00fc4b26ee87c09a3e0c7
-
SHA256
162d5e4b43dc04c6bfbabc07f1d213d3de50a1e75dc7c52f680013a1da0c80f1
-
SHA512
a4ea9d05984eb00122aa362a0fd2347b8dd51466e154465ad982f4638a916505bfac612beb5c862ce0fbce4212a611f6a95c0eaa22f6559a2431ed7373462b96
-
SSDEEP
384:CyiKxI/W3q13IQFAi7ny1wbM826t1q13R3zd4bd0:Cyi5yQFAi7nIaME1qnabi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000033f49b162041a0fb2f4d4d41f2d530d3fa12ddc0164f81ba93a42ca1beb97553000000000e800000000200002000000010f9eab5894a26b4641710e2fe1686458a08fc849f3b41f782eecf1e615d31a090000000550132cd5fc3f608c79e6b86893fb3ff15bd237bae42d0a78b50a7e4f7a6bf82150d81db9a7d9273bf582d4e9131238b958b957ee350e9ed12e4ac31a84ea02f331390576eb92d46373bb1cbdf337878a6c903bbda95b88e5b098be20a7927f62f02b0119d153e6115220ff8e051f68c4ef3259437fd109d8646520360ed1d3807d5b2608448a31daa6579172b11de1b40000000c26bb699f91adaf6375d40d7bda5129cb9e0fb6e6e721c12916822788fef595faacbcb9604ea3f9f4597c0c60ed32e8072350305a2ec439d1a5296623c92c18c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000cda7faadf696680c7e26a975a4e4e448650db8c93f786dc58965e3c000d7f820000000000e800000000200002000000073cfe874f13c87a9315e8fbc70326293e12138ff78fdeecc4ff1038bb2311687200000000db7e33a41ac9f58a1fc2dd629f6829a6ffcb9e6f3071cb831136067740335304000000057ad542f70c6a2e6400e44013910bc92f838202a34c836e3b83484d2b98acf5134c1df87027bc7d4442b765c7209e1edbda1e87e49a3c384b4105e79945dfbe7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432320237" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6041a48e3005db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B85E4AA1-7123-11EF-B439-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1744 iexplore.exe 1744 iexplore.exe 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1624 1744 iexplore.exe 30 PID 1744 wrote to memory of 1624 1744 iexplore.exe 30 PID 1744 wrote to memory of 1624 1744 iexplore.exe 30 PID 1744 wrote to memory of 1624 1744 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc9bb59600a2e3f6fc0089658e50114d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59278ee5266cca016f84a3bf5e6503c27
SHA1ea6550a04635c9c2368b62323912ae9c5bb9aa04
SHA256ed01cd4f57d2f1e05efa036f7027e670462d5f918e22bc3d84218921c4674571
SHA512445f16397b8b09b51fe689ca63e13a2ee3ea9946dd387a3ea1354d04c9c11669b662bacf09a148d5cc04aeaf9f3adb8777c6bfec36592229ce2b601c03d3160f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e5926a6ee706a75f704302be06bbb18
SHA17e098c08f7a9fbeb4314b2cdb5cd583defbc280e
SHA2561bdb94146bf26de249425b5646464032deafa24c84f5654866e50c706d54eefc
SHA512ec09cd383eb116ceca3ba00d3af85bd962c682c42ff9f2cf1625ec61e50ce91aa8d88f3a78948252fab4cb334072d5173f346e5a799973bb62d43a548dcc9be4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0dc5431937535e23b67d145bc8ea3b8
SHA17ef34148951e3c549ad4942ddb49c15344f59509
SHA25619e0f006ad0e7a8e2fd17ee86e29bb2ef33f1c7fa002d404e2193f22b20c270f
SHA51291e06ee457082cbf0c8a953f1093a50cb732299bba5b58137b0a073ba06073be5d9b9cb2a630170d90f36248e7a1f4850ecb07f4993223dd779a73eacd786b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dc1a67e6720e9cd5ab228c330e27f94
SHA1f8966840becda8853981c5bf39cafcc67ee9082b
SHA256f4e9c30948b3b23d536d6e9e61cb38b0ad872e0135b3c63d6dbd14e8cf9d8099
SHA51226b4ac86794b4a28a428b8a690bf8e5acc8fc6eeff76ac4aa3433c0e4ba4a6f6bc7b0603dca4ac98716e185b59df4d833cf2143bad92ff46597643909bee2a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee34558662f807098c73d2d6bfd83e7a
SHA175de695a73be8feac9256b0e9100b553842aa351
SHA2560139dd750ea441b16b6a5c2ddcf85a5f37112599104b1be371609f6a8ed70f73
SHA512d0719808b38373f316ad97fda429c7103598f232c59f44c856bc903b7dca5fc09ec6aed841168b1aa1eb88a74bd3db8f3e0f7b2acba7a68420c3bbc206a85871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bf6a39c84534c0326bb83f597c99797
SHA1e6fe73f301d9fdb6eb2d79fed4c8ee04123c420e
SHA2566c4b66365a910a132415ca7d18cfa8334938ffcf5d2f5ab9a984e36bc400a5d3
SHA5120589009200942d21d43b2a6fce881e6ae97764c8fefbdbd54f2f597447e12c3aacfc3c1b9661a36115c2ca6afddd776774915c7325daf1580f4715253d268cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53274f22b7dc1aaf2e0a9b4b6cfcf0b3c
SHA172b39d7e9553573a39c0373c86828705c4f7979e
SHA2567693b8b1282d46889819c7255343a1c49db23f1af9d6ce64400b8540a34936aa
SHA512b53f6bfbcfcc954bc35ad00625aa8d91eaacf0ccae424204af166e4dc59466709e43376eafe5ddc160f734617ec0e39e238af90575b7a937f89014976da28ca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ec90769bb8c26b019c6b8da856c41e8
SHA14d811c1a34dfc1392e75ace21baed4af5d17df73
SHA25678a30e44095240438ecb641fed6c7897969dabff2a8d7769351becda18dabd66
SHA512a4ec7c46e9c5ac6ecfcfa51189b15eeaa9e04476ffe4c6c7c35bec9aa408d964d576b4781b67d4e18f7696def45b3d0e8be3dd7557a0fa2cd1c0d1eb800231bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b09b79da8c64d562f5e7c14089c9fb78
SHA104323dd38335c47e000ff516f8510a3fa5bd56ac
SHA2561adadc01c9fcb143de2b6f7f30f3a58d3c6b3ee7e54e641a0219c527ac004d08
SHA5120acbf81fe97b6df0beca687f2bc7bbc8a589f3be8c6199aad8bc9fe0b0a01e4dc3fbc92b26316cb1f71fb766fc52871033fe1e21f5199e463eacba9eb117a96c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5463b71f1856ab94f7ceeeed6684591f4
SHA1393f14e533777ed42e686ce1fa47be79bdd25f9f
SHA256c9e60b75e217d1579b6b25dcda5d7147067738d83b9604a00c9fa8cbef55fb80
SHA5122c1a383220c27f3034d01a00bacc5cb650181b0ecff0ab395ae85f6bb161865c49d6478d66dc8c8de9dd92c471292e645469e05843c0b4249098d712d242da0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e63cec0c4909d29227936e9eab8cd83c
SHA11fd702e8fea7f3f1064a581149aa77acf09966fd
SHA2568b789722fcabb98db64ee3a8d0a52aff6e1296a6cf92d541df8350f01628d2eb
SHA51224d2a8eec1868a5eb46885052dd24b3341c26f947199cb64f92efa2e0a1a177c02ce80967d6853e4377496b5b0a05cbde79cb31d0b957cc5f89d8734e42fc0d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570d70ee9699c209304f098f0e644b162
SHA16cd687d193da300ca139f42faad101d1fc439f9c
SHA256730b7ef87c81fe89ec630f9b3b973cccb04592451d3345628926dc644da83dd5
SHA5129cfe624f864944bbf78f559f3017e2f2b90bd64bea664124893455289e3b4b3b53887385819364223c492958c89e37e861af68456369cdf74d033e1e3f75f694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c169c54a7855ae6c12e2d28f7f57e6
SHA1f3195cd401c0541f2a490b13a79c97aa6fe6910c
SHA25682861a46ea37bd631cd4b8bde8c1e95e8c079e69f815a4f119fb6ad449e9f499
SHA51252074b643d3359707df2aba6808efc75e027639e7acf0edcb68bd94bd45a30e9f8ea397c442902eee3027662db0b418dfecddaa11803147b9069a8a4eb1ea93b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5103b4b9f2ff3e838bc4bc9f2b9a39969
SHA1eef2ef46fdeece84def9e7317f8c834785882df3
SHA2568b2c006bea78e2dfa861007d2a889ce6150ea17d991f9cdfea98df68f70741f4
SHA512403a262c4d879afb914be028b3e81a1197ba0dccf2c54a3b409718a28c9ac5ce218e5f4c53ce61a14a9541d20c8d8c1539de8fff648a24decd8bc4580f8b97cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a6c2f628032b9f86d1069a09424e89c
SHA12582addb20a7e6f845470ab36247035540e01404
SHA2566ea8d516e212b8fb778ff9ba42ab58aaa8fbacf0cea27c3a260635a3dc142ec6
SHA5128fcb63dceb7ca3287bd1bbae939c165f5442fef43220410e82b26fbf1e44640a80a37bdb49a2478da4c7245fd317c38345298f00daa4fb3217bfd605db5713a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebfef5052f42235156f0302648d7a57b
SHA1e205e7e0e3ba83d553864feea2083ad529f4bf7f
SHA2560429bf72e47cb637021888ebb2007c58f126931ceca12a716c53548fa9c73f40
SHA5120c537c1518d18d9333909801bdabef3460061c58fd9fd2d1059f24e0d39603964d1be1be510721bb8465d147966538659571b344c0d886aafac8817ca8ea205c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a984cda8b247f75a510b581782dbf82b
SHA1ec7ac2eca61d28a4234aa202390bbbf50fb5026c
SHA2561406310b80ad3e5b1ef63008edf5923f43d3557e1a1864afb141aa9063e62c80
SHA5121327851a8304e810306a8f4114d3df47fb63ee527c01ca529aa53bc3c9df997df4099e54ac17b7fdf4c28bd905e90594b15ef533da4395b7cf608a4f2f35f7b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527145577a75bcb3ebe36de19acdd5927
SHA109739c8a2cd2d3fc72d55d623b7a515745ec81c7
SHA256e1797f2f2106a1158e6262ceaf966fbb71048f6bf76bcd4eb5b4f3d43b5143e4
SHA5123713ac121383090a54824dbe763d40f6d28efd1bda87ad3b764534ec7352a412799e49843110f185834aa5ed533187688d1ca4d4a6be12edf97fd9d5aed7d24e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5a183e02ac9093eda55e9e55b60ee9f
SHA18838f69dee03035919e4012a5045b70cbdf964fe
SHA256f64767cdd113840b651eed93d8d081b69f55c1b157fa388fc2f8ca22bb371484
SHA5127c3f38893f9c204023304cf2e0fa8413e4538c4c8b4f0942445b750480391506b2fd0639f3d0b146a6e9c8082faa6cc9214617c7774e2ce43304f1001a00c6bf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b