Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
2b29bbd636e3e1d8ab49b1ebb48609f9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b29bbd636e3e1d8ab49b1ebb48609f9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2b29bbd636e3e1d8ab49b1ebb48609f9_JaffaCakes118.html
-
Size
5KB
-
MD5
2b29bbd636e3e1d8ab49b1ebb48609f9
-
SHA1
2b963d1554816ffac1d1b233e5f73176d670a806
-
SHA256
cb649772050c8e7bf5530b1da6e7641b30e9d3f1233a4f2e53e3ce77853dd38d
-
SHA512
736bb7ce6fcc534c4f4ac4f70951ecdf9b8d48bf7375d201a182946959052c03a15618faddc248f445b11bb2cd304e05b86614c5d021ada170637f7eb39d6e6c
-
SSDEEP
96:xAQqwVmohNvrrq/TIvrrerITmvWFAsY84Dvc6iCVsFJpQZu0z0LXCpG/9mR0Nmcu:ywVmoHvrrq/TIvrrerITmvWFA184Dvcg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000122f21e2f0d804cfc7cb7d0244870ccc36b7f2d34f42771da41d6935c1c5ab3c000000000e800000000200002000000094ee20bedd718b8ac4b6ff2e75807d8cd19c0392f0d05743bad426dfc9136ca22000000066a84aa9cf7bf26254b4574d6d379db78f6acf85293331d44c53c89911881fda400000005a940a1e14b0e93c6896c9de4cce4e935b093c02bbffcc185db70bc944b2af40e6a2c8655bab4073df1928763248d433526e6c0dc7d2d6d9cc05973b4e7e5962 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A743BEB1-864C-11EF-9D09-F245C6AC432F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d7f27d591adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000009d50aed2cd6c31598378fe7bd45e97d6e8e48a510d3ab82e20626ff479a701d7000000000e8000000002000020000000dc02b31f9c8a0e698dd1256bb6eb3130c52312f36a06d901abf251b431aa97cf90000000fe31a9c403c8e0f1be293a5db8e867ea17ef8184d32f1fa96b6f61e61c11ca0fd366721c922d567c6cca0f6bbeb8122d47e9bc19d13e12141d7ec0e95fc8fb919986e5768a20c84aa648a7af0963613354e4b9dd8e0fdb9a6e830e2cbab324e77415d8189ef2b2182957019be42f78df95949347b201df72f7aba6bef06607bdf78ec02f617b9f851fff2985dc096cbe4000000061c82674ed53c5d20745b72a6d80ca2d19a68fe9aa77a39f2fde52f3c84f44561db559e5fd4ac3e5846c80d90bfa9036f839695e17162fd64bef01ff1721b4c9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434646793" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2776 iexplore.exe 2776 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2836 2776 iexplore.exe 30 PID 2776 wrote to memory of 2836 2776 iexplore.exe 30 PID 2776 wrote to memory of 2836 2776 iexplore.exe 30 PID 2776 wrote to memory of 2836 2776 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b29bbd636e3e1d8ab49b1ebb48609f9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d69867cb1c2c5f1cd53b8c089379a8bf
SHA148b860cbd14b5fcc2e7fe6902150ebfc52c2c0c9
SHA25656798e711957bb1dafab774796bf9fb18156cd4c5066fcf4f6de439bfd18b9a0
SHA512ab1cc61f271ebed24af3c9812a73f80b3d1dd13e29a4487a410b58259a168aaef48127c5327c463354a98a1f224cfd6b303e18945817fd215030800732bfdbd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da44da86407b3f4f460007f96e9eb1cd
SHA1c73aea38c767408dcceee5de4b4fdb5d681e2c75
SHA2566f7ac05fbd9714e44c175122a3f2e43150ce6bd6b362c6d9e1a9c4ab34d15041
SHA51234c90b53e1d3176efb53cd9b9e49a568680676ed39e2e8344fc0721f0a236988fd2c793b7c83263b923de5446f0e60e899a9fff5877b4a21865e0009de34ed95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52562e0c32874fd83c35f893eec17661f
SHA18c689bcb1c8789f8ae5129761dce9cd7587070fd
SHA256730075a5078288ca12ab92037ac96dc7da9ee80260975f6d5e338d8e3ac87496
SHA512e479c4f17fb39f073c22801b82ca7f7c968eef314d40ec12df5d80452bf5392b686649297d78a1e5b976db0792b5d77d02adb0dd06183a993bd2b0f47a27a009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f97510479a0c24f81bf7d919caca16c
SHA17413dd02f63837e30c79b43513d5c2a5e8decf1e
SHA25636d93c8d2ec158e7e0405ec6e612ceafad50d2dc165510555770a2cd321d259c
SHA512bcbe9e57b65f51e77876e5e078d487df7ffed46fdd662abc44c3ce6de079c02de9a3f7048c10a1185b791932171406861e2a763467c7e6492988da4ebba945b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564533203951fde2bb02fbf3214b78a56
SHA1ec826b7d36bec63fabf7737da873be9765b1a664
SHA256757155ed8f3389381f78c2851771bd62853c9af30c8768fa6b3028cb71a97156
SHA512ae129f794ec73f2b653e3efc8822e15552aaa9417ba2050ce85ecd9928b1b032834300051ab854e6294d782c4596176e40efed50e5cca8d8726416a60b4d312f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5014ef06b30b4141025fafaa10ed76337
SHA14e7a3c2fd35290478c6816dcf5f6868f338ff9cc
SHA256b911563a8b1018d216f2ca57213752ee0c89a67d7583023a47126e40f6b1a996
SHA512461e8711de375e58502d0977c8e93b7d41b894bd66f526c7423d3a4fe8d1e2ae1b176e44dd7b52129cccf0a2507be3f7b6c00fd9bda5f9ccd17a72c55ec414cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b9c96dc7fc9edd561939c0248d89dd7
SHA1fa8ac3641c86a3f585124d43d191d5a5d7d57e3a
SHA256dcfabe2f4b8cb0ffbaf9ba4fc04420f1f7aab5a1e9274701f424b6e1c7356cf4
SHA51273b3ff9dd6888eb211c4d2ee2c8376ae084152aa05b923b7f8397b0feeb052bb98da6a5ee809b4d658e37fcb0438b011133433516014315887c0dd7c95e319ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540b229e1960abeb18a9558d46ca7d003
SHA18de7a6afa4ecbbc890cbd06623be4bf9bb76ddad
SHA2564af904bd440396768d83a1b867164a3743d643c5ec8659544d971578b5939e51
SHA51244599d0ea0a48eaea288573f9b12d98e6e85d576a48a3e8eda1c30ff8ba076245d10eba46161c5b4f4a4a20438643bca6a9221737406ee59e2ceee546d407c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcbd452209656d2aee7b2632066b59b6
SHA18cfcd45f698ea1404cceb79b9627385842cfa573
SHA2562264120d31555e750db135dc243e38b8637585798ceb57ee86796f4d9da3f534
SHA512d368155557216487bac380bfd20af6f361cf97d0ce914e1809e64c39222f6077fb34ca7ca5fb269e0b70898ccf6743f1fde4bf883d24122adf8cabdb825b7f26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3529a5901596b91707db505acf103e4
SHA1d9fe3df4fbbf31b2d6edab269685a11f4ced7aa7
SHA256571233bdab1e0c27f6b42149e166a7ff89977efe7cf1375392cd900b9f852a7e
SHA512fe9f2b53b542885095346e1b4249d4c7adb3cfb9a0c3b1b50ddc7b3ce33081a8dcd4fad604ea80bc3f4e4cc0b8a4c87a062d17d6fd1179ee063293eebd36c976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dcf332671c1470fa99b6d7668fc484b
SHA1f392669b8eabbb1258562bdd1d6cedaece024c20
SHA25636838274f5a1d96ca02a8651624d48ed5d206ff1c3420cb04d2e52bcdf513937
SHA512fa9ca0f26a6c5f978ae8092c6af9daf536897c30fc7bb231c110949db0a90082ef8a8705e3d42c31acc267b56b7c0fc69fb38fe28033443b42fb453fae2e15b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ed190cdb74fd6d8177a1876c97efabd
SHA12e7ed6f91e7f417e6ef2e955bd89f6ed83c254ff
SHA256ff757b99798e63cf1b59e72d6fe15711e787f810fbe9dbc731c9adc5399ebd96
SHA5121e9aab50dc5ff18bc7bbc9fe26bf748190cebd2038cab5b564eca135c7e33af59b3b46b84a53428a31337bc67704eab28175a834022378483a96bb053e4acd83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cfa28860a4e686265b6f8615a9f98ca
SHA1b8dc58db98412b6a619ee8fbbcc5476f542001f5
SHA25606cacbc537bdc3fdfceec06c093224ccbd8ad5bf2908ba14e6fceeff85ae33fa
SHA512975d2fd90dd509ede9277e6718a2d61bdb5598626c6e4ab3a2bd99aacae6722d13535376b41ec53676e9a6648f2713dbd109b02c5e6aba289ef8313f5c400b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fbddda6a1efa5fa8e56ca3736353524
SHA1cfca409eab0f52acb06dc86dd52da21e46f45c74
SHA256a35e39c4a7292141eeef09a8441d614ee799302566e6ece868445af66e861189
SHA512b851fb90216a67357650872cd02d4449dcf5a4a6783e9c7374a1464fa5b7c4df345daff5ba18b493a038a7afa365a9259e2d149298d7c6cb7cefa7b2b005f543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9df09dda6907785803e310a68f14d21
SHA1e15b0a7c22ae23c6dfc14d5d8451b5139b2e3ee6
SHA256fb190ee58d031da284b5bf5c41d9d5e727e1427a250dceb1a6f50770c0a6f20c
SHA512a7db9f98c5548c25c56503fb37b52d1583f6fe95500b0701e7eaea9393039c61ee671b3a91b6ff3df92c7104d6733546192f70b93a27af13a2e0748b57955803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566ac53eb3e2666fd54351ea705f7e464
SHA1b3370ddf87038b461a98ad7e8ef5dbb5845ac0ab
SHA256de27906698161876086ebb9ca35a659698cf0b3ddc8b76d30c791308526ec173
SHA5124e8f3f82652b754f897666149b1c4d639c76b55cca83e00a937b682079c84e6df41ae5c7b4d738d7d02ccb14d10b1d27ee2740cad805ddbc88b0a0e7f683382b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1554763829c8f3b46be08587bf463ed
SHA1ebb0ee45cc82316da9b4176ff76f59ddde15e815
SHA256c4ab09c879ffb29d93fa32be894c185ac396f4595d04c17fae9738fa13b9743d
SHA512820f08156021033428ff02bdd8fdbfea8b3fb1563f0405ef012929368975a0dac09ae5c843ee260ec3ff06f7c27273ccda64e58a977105dc0bab2f61c6a0b656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ef1ec72bb75788b68c876113598f8c
SHA13b50f37767d03d85582e806db3ac1547e7a9b8b5
SHA256915e7855d8f1f04f31f15dd243466d3a02085756d2216b5abf6337360934a804
SHA51268434d07b01c3c21bfd46851c23dc39645b1c21517a17d5416b5809ff8a41609233009e1733340c7b51b16f754fa6c5927eaffd1c1927282117d077a8b10f08f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0c68596371a61498d2f0ae2a1d54057
SHA1c6ffc0e2dc4ff06433f5d9f5d53c7751270223a4
SHA2564721001935b67221152d86d2374594c67a9bf6d6183e73aed044bff98767c245
SHA51249668e56a4cbc49f822edf135a755ae334905b310ccfaaabd65d9faac74c7fcbbca92cf9ded53069eea11351f881d3cca1c2c0d66a3b67a4af1d572b015315b2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b