Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
ea907702ac17c648525c136056e44971_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea907702ac17c648525c136056e44971_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea907702ac17c648525c136056e44971_JaffaCakes118.html
-
Size
23KB
-
MD5
ea907702ac17c648525c136056e44971
-
SHA1
59b0040142b9da16e7f4bd0b223c5d822d1964c3
-
SHA256
75567add4d51bef4891ea1781cadcca7929c6a2d8ec47c365eb397fa42d2c3bc
-
SHA512
ae8d34cb761c85475a1ff5ac8041d3fb2a6e41ef3dd3cdeec7d9098e215dd92105dfa6e9ee7fd85576c6452d46c48fb0bf12fc925f20f85135962e6452c66396
-
SSDEEP
192:uWPAb5noOnQjxn5Q/3nQieeNnenQOkEntlNnQTbnRnQ2CnQtswMB+qnYnQ7tnaY3:NQ/Sgo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432881100" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3073656b4a0adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000063861e45691e02899b672182741083d542f8bbb76518a78348c15b5eec8199ce000000000e80000000020000200000009649b23318a0ac835fe007affaf54fdc562d1e82f472f1d997d12689b83b773f20000000d03d8e1e097a22eec49ae0d1c81dec81ecbf0f6f179bf5dfe142c7e57798aa35400000007b35c3f6fe85f178060664be18e2ff69de385b26cff4d2452857d3c642aece25befedc4c3f151821769251ad15c709dafba61de9462893d662226bb3e8c7b37c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{94C56DC1-763D-11EF-BA16-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2600 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2600 iexplore.exe 2600 iexplore.exe 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2600 wrote to memory of 1796 2600 iexplore.exe 30 PID 2600 wrote to memory of 1796 2600 iexplore.exe 30 PID 2600 wrote to memory of 1796 2600 iexplore.exe 30 PID 2600 wrote to memory of 1796 2600 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea907702ac17c648525c136056e44971_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2600 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52303fbabeb641b9f751d2ab2acb831e9
SHA1f3e0ee6d956af37aeb568b2af8f459b748751540
SHA2560e142e2aa450cfd2a72b6af3167b97071b3d9e9e60199f36f177f77665cca021
SHA512657f89ed6aed51a516a6cd7d35dd6aeb16057e83ed8c6d6fb8ee23628083c1657e2eddca497ecbd08b139bdc60910d5bcb428b23e8b1a8ef09871e8306ca0f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fe8458c57f5aa58a234be1d3a48aa50
SHA1133ed6a9a129adafe05a5e4c154ac4cec74dc16c
SHA256f3fcd0c4ce0cb0ed79dc0373a1785372562d186812db568331159f0517441850
SHA512a34d70aca1d525cf9360330d970d4a111d7c4c7909d724285a9cb8562a1299e1a6b8358cda4e3a0e1818d2efecf3d2e22cf46b5f4f8a75ed22719a2537dd69d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0eb792c92ca5592b444bfa212b518a7
SHA118b5cbec98c3daad23e3e2debe0bbcb138fc3de9
SHA25630d73d0892c09311ecb786995ff98bfc7f46f45f01f0ee5963f10ff4029a8a44
SHA512c38455537f5a5602699f0be970636f9c6672c4ab40d41e0f77fa4843a24bd2e9fe4dfa0ece399c434fc94fbd90a3827b4f622197ce4e41a1184bad5a2240761c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5970f411775bf51937e2cbc7e19df40b0
SHA1a5177a98a9dac4435dd59990218197edcd024f63
SHA256a66459a0b6b4350bbdd72ea9ba69cd42a474fc62fbec56befcb31b6299e8beae
SHA512af44b933565b09b2cc23ba8be9ace0a472cb3e5d6c9470bbfbc8eb78a36e2fdc384659fe4c03bb7e4af7769a62e8c2c098e7b667d10c9e3abf93144b92c06a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aa9a0c9bbd26ffbca52cfc32d3f115d
SHA14ada4c45b1ba81537e7ed0ee1061e9fb7f5844be
SHA256165d1d87378e142137687e5c8ecb96cb7211e227f56073044cd76866b260429c
SHA51201152987c82d020a5bba258a5f4789c3164664a8b7be44f040293f35967a3648db92d3c7a6c9c945d41983468f7faaaf6ff86cffb9ca211047e465847827de0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565eadd80b5432a9e3f8e32e302c12761
SHA1f35f71051ca412bb6be7418cb45a4f968d25d769
SHA256a3d0c7bb637409ff4b553f68810f4285766c7bd6880c06136136e202bd7862a0
SHA5125f48bc7e3762d00dbc8e84ca692d268190b4ddf290bbd77973b74cea0d6be2d84f8a072ecdc0a3edeecd895f6e922b366a760b0fb170333b57378cf45cfbd482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efbf6d075ba113e107dfd93e12a84d59
SHA1a84c63efc4833fd6c563b0342efc706d175ed781
SHA256119a8e5f99ebecd1cc2cac8a4f12817e3214fcfdf57f4d65c506665a2e2e2ce7
SHA5122ed68d85edd2c940dbc8a3551e590941be1333c46ab61b9350d3d37a589004def378dc4c4a72f75476da62f74d6571014601b515da2c752cee442c4c49df579d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ededc2bbb6549b68449535d67e1eb95
SHA115f12b916a2e82de3ef84bc7fd2971cdb29eba23
SHA256f432a15908633e98508fbb3fd54a65d9e8a5d41bdfb33f65c97ad925f56f50f0
SHA512517f26e57fd69c61eaab438f9c10a477b46b540190b1fb988af538a6edee65b424f3f8a20fe1d330ee61782601333b23eed6f2c34f27ec2ac056fc31c2eacd4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75ced1d4d7f93d0a1173abd17888c45
SHA1afeeb82d88abecc223604dec026688d77c3deed0
SHA25657485a6dfd85db10dc340473e09f2c37cbd1b6c9bbe83f7308ddea4b04458c74
SHA5121700c1b45cac1f0c51ec4b94a30d9f7dce508c82faccc36976216d3c1f4a2c44e9c30a45cf2e9564363e2ef1447731591dcfb407affdebaddb45aada206d27e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a5fb6cfa7ec75df982fe62fffad2734
SHA1cb8794c60e04742cae106f7ec10357a642783953
SHA25605952e9d8dfa52fbf419704495e7ac1cb07357b912f061851935758cbd666898
SHA5127f3f516d6c5cde6c1a5699ce1705d66cf4ee862896bd0c311b853c9b69a8eec782606c68a090a1488fa17df8d02d047929644d6e38a750e18630e8275f5a2f86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580d5e886e493730d224588ea5e4a4c2b
SHA173f6206e381bd5a6dfda08e5167baaf208b96ef5
SHA2565e185d27e60e4d120b772a3a7e20652477c0d1b2ae485f1ad4eedb2e8a52280f
SHA5125811d1b8fdd24a031a007a06a86757d49be0110e5a5d3581f78e8d7406de865d711bc4d5a4142a3e24b739d2b97c3145b0294f0d50c1cd64e20dd9ed9703dfa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfbf5dcf020e7cc38bd495c37520a95f
SHA1274a0ff3bfb71dd19bd48a5e528708ae9c7ee44f
SHA256a4f18a0d4443d5cfadc18a988b51f13acdbcb32223f683c63437b42153c08cbc
SHA51248d81c1e5a533a6d7301c40c64956cb27d32494d39fc37e4aadad94dbdc442b1dfab724baf69e89030c8e9c18c20792582f443411de819c2af41b5b33ee128cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5112921dfef43d2cec44c1f0435d188b8
SHA10103785b2293ab846ef10c85ab9eadbdeaf08626
SHA256f462be65893c7463514f9dd4ab81421468f6e0d01f026f06dda61851300f69d7
SHA512b2a58b59fe49904eb4bb4b6a9856c866e90f5c99be14a2dba55e59e8ee9f5580c46c71264fb13c3aa5219ba28d9dc05320c2ba2a0e60fcf8b674211f1eac1642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f37904e23c67375f63c9a1bcdedb2fc
SHA1a8247f386f72baa3014dcdda2dfc48cd5671b845
SHA256a872f5421252935ea299aaa34e689165d37519ccd4c41e2629a7cba39e1bdcc0
SHA51245d666b38674306fb8879c8f7110eb2dfeb6d4349f4c47498d2ae684123b6d2cc7a77298e81a7da0426988bbf16a2f50007386e51e1d91d9fe16a0fbc2273a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a8211aa0c38bd323bc3a342cdc2ed90
SHA143cf92ac5c491ad04e7a03db5af25c3b27f2b01b
SHA2563aeb87d2d46a48cc72fc9b080b4d3c3533e7c0ccca404db517cdb10776d55db6
SHA5127a6a9ce14842d289d6b131424b2cfbc65c91ee452c911162d3289392584e3d5389131c499db32fc64af2b4aa72ada65b290ecb0d855180b6bdbdcdc2a459bfd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527faa1360873326548b2546a11bbc7f2
SHA11d062b69205b2f056d75607711e1a7deb5686dd0
SHA256670a40f4bcf89a3845edf3f872e2fe3b8a7cfdede74450aaef20dfecb8826f26
SHA5128c1c642c346dc17655097b40a41d9cd6ef46bfc5afa994ea2aa5b09f947c39cd777ad196027352e2ce41643b1f5a50036f799dec93b943de7af2f63ecf157140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508bd1018b5a2360bfd69953411fd1548
SHA10e62ad3470f6305f52c9b4fe783d6688ee8dafc5
SHA2565afedbbb2615e328e893286d51766b6d72d95966eccd6d8085b2262c5005339a
SHA512470664a6a60492abd2059159d782d3e6db62d96093c80a884742ea7d56b69cbf079b09b34a1cb42070c4772543292d55885841351bd61e2185fd9c644ee6e1f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59229a0c80c9736c9e27f41e60e9b74f8
SHA1d8e85c195b8f0e79eb57f3ac62b163b935fedfdc
SHA2560a8b14f5850ad734ec6737c34ae23e0ffb3486eadaaca944d958094274ee9b0e
SHA512114cf9204f8b51a32ce3b4c9c4ec5d6c8478c04a2f0ae4a8accd0ae5eb8f0c85edf7af29998c53d3f48fa9047c8a4fb92c5db55fe5988542303b1d9e8652cbe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576cac476fe78c297690d8ef73b5ed612
SHA108691bdd829a05c898de79341e560c442e373b46
SHA25607d2c2560eb30ea657e723c99eabfc324ed4718902e6951a3039e2a711762a03
SHA51219b7e417160b19d92f5848927c890373ab79b4471f45638b2e72ca355259f99bb055db869d5bcc4f579487ec3d785dd0926099b804a93569a2af6af2141ca5a2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b