Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 08:47
Static task
static1
Behavioral task
behavioral1
Sample
09d7da678d1e71e9561b11f6d12d3d15_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09d7da678d1e71e9561b11f6d12d3d15_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
09d7da678d1e71e9561b11f6d12d3d15_JaffaCakes118.html
-
Size
34KB
-
MD5
09d7da678d1e71e9561b11f6d12d3d15
-
SHA1
b422eadf2df1b67799b1c7929658531de0408fd9
-
SHA256
17e4ede04c0dccd1eb5d346fb0dd8c2a17aeae036caae3bbfaf027a00a78efb7
-
SHA512
51f501704e3ce33e573b2453593ae56033628b7eee77fc2fd28bc3c07852266977662e3aac408f96bb9da1cccfbdb88a112753b34897273bd803ff21d8c8b0d2
-
SSDEEP
384:SIv2jH46HtORiNPigLzrWJOMglGfAQA/hEJkVpXZJUARY9kak+IfqrOjxUSOIAfE:SA2jkMCEEgyMXZvRY9Hk/gWxnANIr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434020729" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC96E891-809A-11EF-9BF0-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000009c10cb6e20181430fc9beb7e61adbe10eb2ed4b577e4edfa842b59171006e26e000000000e8000000002000020000000b69892e43d212e337e0b2cebb10b8d4f4edcf84b356129f67a00e0e5c6cb1ace20000000d84d60e56a7580ed1f93ad4785410a035fff026cc93589649d31277cb69425c34000000042ef980fbfca08c112e2207564011a3afb452e68e682847bb47149ff37dcfcd3a5b026fb86acf6aa754305cd9140ad8b50f7a64e1d3c8be9fe412a0017be89cf iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a821eaa714db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1672 iexplore.exe 1672 iexplore.exe 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1660 1672 iexplore.exe 28 PID 1672 wrote to memory of 1660 1672 iexplore.exe 28 PID 1672 wrote to memory of 1660 1672 iexplore.exe 28 PID 1672 wrote to memory of 1660 1672 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09d7da678d1e71e9561b11f6d12d3d15_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513bec4006be316715fc06c767bf1fdbd
SHA1d5b35775133e26e80d07e7209165c2c1892cb193
SHA25655525c44e606c533ecb3ae0b9d6ed33261b7661f63e54774715f91b1ad18ff4d
SHA51208464c6d4d2bffdeb614d70e43affcc1381c8e11e8dc2c650dc92a9dc368bb9ee548bf40194b9ac32bd479cbe11c889aaa25eb8f22764ef0383e51e6b3382bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b46c3e551ddffce0b489ea4f1b73e051
SHA1d166e9a936afe55a86fbe329f942e1e3429e6d75
SHA256028b9898c9aa2f6ca5a3985310fae984f347454b272a67b5b16854cf7b2cd238
SHA51230273be2f0b9cc77093aa561810a7aa7875a8957d40b8c0fd567513aea55a705bf230a88d89e53bd2c77b6f119aede3687892933a8a184c991121e2ee6f12cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536eb02fff4b8615a3f17351ff5ea68b2
SHA11212f5ffea8cd8672f7b58bd74669fe244f524a7
SHA256f3a21615ced4f31460bba4c593971c0fbce5b28b388d02e16f41195c59e77aec
SHA5125d63e524df114e8c935efde658b940153004194ff0c1a16e1353eef78b55fcd8fdc748bbfc2dd2ba27d543b46310e59bd6f8a2bb01c770d7f86d1f854f3ad93c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5976b501307a26559236530031b79fbc9
SHA1d6deb3a2fdd0ec3468bcec244f8bbbeb0fe002f7
SHA2569fa26ddd00b7ef1b07a62cd6978c4990465aefe80b867164707780b2953b4c5b
SHA512641c9c8ab44c19c18172a529f9bf9a5c3e09a4c980a0849b93afd40e6bb4e3a23d14ea276460ed9ddf243dcf347b89b921087aa0a0b2718a5252b66d74217599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe37531483aa9b7e890570e511b80cc3
SHA19b2df6196d8a68553d8b45892c46bb55c0acf37f
SHA256913668501bbfc9e8f5ef96da68f5279cb0186bb29f06a37c77e39131e0bcef63
SHA5125bcb27964dd31d5acd755d9eb45dafc593f03202daa262a96df187ea12733f03de30725da4cf696bcf580b999f3efdd1cdad780f1fd0cf7f88f2af3bb9954997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fb2d702dd8995695bb079a102633fe0
SHA1025d2b614e2ce493c954d69f2fcc6eb059aea31a
SHA25663c87cfb7c6eae64f8c80b17e61b07f6b2365b633fdaa01d72bfa99755110cd3
SHA512b0f38b8247370c173e2578bffcbc3ff50bb92796d52ec35f19b981adf50a34fd6fe2baed2aa2a6e9343b33575eebc8beebf1d4b28977d1c5b568cd9653cee6d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56088d2503dbadcb2b4e178ca57042643
SHA1e6b313a3edd809c0d13367838357f977eadcd3ae
SHA256f84b300b3cec214e81cbea36591be3af853ecc6bb43c02f36992d0937cf2011c
SHA5125460d19633a9c3f85d49b844892d0e07a544e7aae2518d1d34929cef887e5f4bdc3d0d30090f50a29d1787180b67a88a9933621557f7f997174c23e9918cd5e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a8fe9acb67ae9404f1de21940c43fb4
SHA1130a749e874754ecfa54371bb58838f6a03f77e4
SHA2560b9c7003e0fecba3e0a434151338072f23f208c71db37871690bbe8f208cc292
SHA5129ddd5a74856999bbc878615e77b3b84e0fbdb76a0d39bfb581944739c5adc842aee754b53f0a27b233dfd1803cd14a14dca9e1c4a99b22774187db58d03d894b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cfe57d230d4f5c656095ec60e23400a
SHA1683fd05f7de4222fe08f2cf39c50b252cdda2fa5
SHA256f016723c5a3280eabb50ed5c9e1c194090d8ab1bf16fd2c07411ed5d6355afc5
SHA512eef34e20db08253caaca4ce5ae081f0dcb9e9d2e792b9dfab5e74041f7367066cb36b3bd3b37677babe1bc909519f35bc997abf3f9cd20b9bd8ddfc5d645d065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d878f537a21f37ab5a70d603a2fe0c31
SHA1dc463b6dd21c65eaafc8701f7f161176f0a28893
SHA2560dc7d7d7d9f64c8c6a912addca890926654f8a19fbe918b59ce859844c99fa77
SHA512a773fc5db1395132519ce63f02bb78c33530fe64790b86ec18440fa05b6a55a7098af998797aded187ecea746039de0e9948c1ef15fa3aa740d893c94c82feed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c86bb7fbc2c40eb623296cb5aaede43a
SHA1dd68915c4c897befc4c1ca382cebd2f758a22c75
SHA25609ff4c921b36bfc989fc3bf7e0d4c20ead499d4d34723edab8c7510380f112f4
SHA512d90839ea8ced6fe137327d113e8e17bf142666cd935be3e002220b0c1df478971a839cb838ba54a01730bc5bf352d2ba9ca7f927197e581ca202aa2e34057203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5695bf91f553200304da7ff715f4aebc3
SHA1fb761777dd9cda714977b7dcb0e0eb2317585cbd
SHA256e4ad6414f9932e4b10bbf04b04d8d2a3cf30ae5c7aa70f6f4bffff4dfcce31a9
SHA51295f98644ace9ddfde08265a60a8d44886f35928e1a45df5e5601281ce63047611e757d18e37452c75c0b6e7ddbbf608f4ddf83b9b769524eb1b43f71ffb51f79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581b140fa38064cbcc6aeb67014b32065
SHA1491fddf71f868f0742c5f1e4ceb5477f3c29a9f0
SHA25629f6cfbd0848e265b53a449f7509a6f834fcf9680f44cb8b207a0d6153272a54
SHA512c94e98ed5370f3dd17aa7e6e253093ec242d6a7625fbbccfc4f2526c1a2d758635e189daf794901e5873ff219e13c896e15da8f4b5eecaf303d0346b5ce5e10d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9dac53d9e32f9ae54ba23669630f863
SHA126fef091a999f5124bc3a688b945b8654569aec0
SHA256e4f0171e3caf8de07cac35898de144ff5b358a7d52edfdf26344c93347a12b9e
SHA51201a170c3e6ef2fc8a0c461512ed7c50ddbf99cfa058fa14e8aace1f2211e117e7ca9ae5709a850e0081296465367b04a3b4424a7f2dad970182ccf631554375d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554c12bc4b2b27812c5ac670f48f17f47
SHA14343458b1140255fceb8f02a16f31db0afc5e29e
SHA256e9d8d1a45adf0b9486c7c683e8486d53b6d1be201cc8f70db28375dddea8e804
SHA512379f817c90588c4d1a4ed49575c1572820caa767541a8660c57b1ffa65552b96e45638769ba32ae8a9cf3b6acd1ea93a4e6ef9a9679389698ed23b84a644dcba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac480e7da0be7d2f7dc2114fe33f514f
SHA1bc5a4180d4e62e120d687874b05d35ca044c297b
SHA256bc6a79fe434c954124849ab510dcd40a44d43bb93a88992dcac814839043b662
SHA512c398336baa1dd6212d40b5e1a4e835cd8430aafff4515ebb077a9f047fe8b2b60f5699b0ef925cc8e85fd5df725d24a4cbf0d01bf0d9bd0326e2736bdae56c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53da65c27bc7fae129ad619ed0f3dffe7
SHA1a070c9feb8949d6d705a9bfd731cfb95ca90da68
SHA2564f7369529c555a9bca1b340369b2f485995beebb2fcbf76f4038a447e75ffa01
SHA51253fa043323970ca48741f39bb772f399e5f076d39b953e0cd205fe7f45d85ed6b604938d1d5769450e62b4bfa0b62578b0605126d66f9ada4a315c7633ac0042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ca25b44e6c939c09d526f1f490f9204
SHA17ab4af24d863f6f905b691dc55683bbda7837b51
SHA25696ce66731ecdd0795fc4c3ec5d600a35d0a9286709f99401db1c92529e8ff92d
SHA5124afeb1268149b3aad2bee9800d1e442e766671d74ef828db86068ec7c8bc23548a7c558d58cbf1d4213a30a95ae12b278406ce5dbddeb6e3126986b8d58f173c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad6992c7ed22b69339f648ac74fd570c
SHA1cb903906cbfb12c75453f142110eb5fb9b9868f5
SHA256b8d109ec621f8f0edf254877e23b2c6e390ff5d7790ea834af2ce03d137e4745
SHA512b85b9afda526bb20cb6094e224d66915bfc8c8acc0d9c405611dbc67e24671c20a4a8cccfec2c541cb9dff20da2d2478f972b639c466c3943eb3515eb615b722
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b