Analysis
-
max time kernel
138s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 05:53
Static task
static1
Behavioral task
behavioral1
Sample
38b4d90ec66564ec8a205086fa6421f6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
38b4d90ec66564ec8a205086fa6421f6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
38b4d90ec66564ec8a205086fa6421f6_JaffaCakes118.html
-
Size
214KB
-
MD5
38b4d90ec66564ec8a205086fa6421f6
-
SHA1
396311f52b3734ef2bbc0fc478f551fb6a808cc0
-
SHA256
291c822a33cbb4aba9d5ea6fbc7835703c5656ef25ba92fb7153e1e5c4c93121
-
SHA512
48c095a0e659fa9d347035046201a31cb9103f36cd1d2a7fed0053b7100af9c47137df3297f76547165dda4012746adcc7cae0f1fe1f9b4d9ae78930e9123df5
-
SSDEEP
3072:yrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJU:az9VxLY7iAVLTBQJlU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{569AED81-885E-11EF-8C40-E67A421F41DB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05a666b6b1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434874291" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000001e58355964d0ed9cb95658341f5f8c1ab37be43e95029b9dbf2e8f36cd5fdb4a000000000e80000000020000200000003f2b8c7a424c73d64566f968699a7c36d27d381a3ed93101bc2a762560c2fdd22000000023e3db2251c30364d697cec281401866c521c9374ef142d3c4198407f4237e5c400000007c1d83d0e3301888da92dc391ee910b6594fe126503d0622030c91638fa28397d8c1282a84d0b7a3f06f97b2fe1541ea65172443b77a361d9d97d8ed5a2e50bb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2352 2204 iexplore.exe 30 PID 2204 wrote to memory of 2352 2204 iexplore.exe 30 PID 2204 wrote to memory of 2352 2204 iexplore.exe 30 PID 2204 wrote to memory of 2352 2204 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38b4d90ec66564ec8a205086fa6421f6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb473300626cfce27fdb06bfe160c570
SHA14497983d13436016a907f3218fe34c3cc903d9bf
SHA256781271623a48f229c2e4dda47d7b80af880f25876c3504002be72b7330456eff
SHA512d84634c6696774a61353b80b345513be33e6219d775f7b9f84ee2a42605a29bf935614a34e0f0306e1e00ee0316a1e7b946d24304156c40be51b0a7bc6124894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5127fb7c227a41989b672e8f98ca27e0a
SHA172c3d61853900cb04e702f5f21f577b02bfb971b
SHA256f95d6ce010a7dd7e22fbfdae162a1a927cf37086a08885452d3a1d029ce9f171
SHA512fa0d9ce3dce72d72586698f5a8dc6f0ed1b71f7bcfb3acce3ae8bac197315320a036cff6493889eac5940ee1162134d79cfd68709db2789674a6bf052984c6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53baa4ceaf426dac0c6d7b223c37dd8c8
SHA131abc4c438c03ad3b729625f059eb7e3efa2a505
SHA2566a1464892d022e09b25fcc0ca9b923c182a4f0c1f731b894d86b490fb69b079e
SHA512f3f87c3e6800bf92cd0e2ac2468d28f9cc30e216fc0b0dcbdd42e3d05bedfd117c8155842d048296f9e454a7da915c53d34e98d74fa794220bfea5d097641ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f6efd13000294a3a3c8ded970018084
SHA1a898de782e5d88e7c41c08da39a3089032fa080f
SHA256d036f9290802d1371a30e75b3a1dd5c0b8373637b6c0b77105e9cfbd1ee202f6
SHA512c8cad580c564bc7ab88e6a74e02d33a47870f49bf4ce30785e2bae708327f52f5d00a139b056c704d1a268867a5443f8531cd3b37a1e1bce8157d35e374429c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f408c4f65d3f9519e679b315161ec92
SHA1e43dcea5f17e6e86a107568f77ebc39223220a59
SHA256145f017131df16b5f546622b62144c19978e87d8feabb933f0dc1e742de22db2
SHA512481f00b4407b7b10db55eff1c4fe32d74c68395ae993445ff09c39e964357523d38c4f69db1c9b2cd77c091075c1500dfcf95a3b53c4438faa4b37d9904c79e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d36d78a6e21cb6de1ecfdabc5088ee7
SHA1b6d5ad23d6a9fd43b2b13699839a3be42698ffc7
SHA256e5bac29deeef516c45ad2f468948db87a990db2079b1c6a9709e5010e144f947
SHA5127fec0d4b66f08aed3126c9c49c08ceec0cc7d4c72eb5c541049b6b51ddb460bba61ea1766b358ecfdf4350dda5a0390b9b3740d2d02ef47dc3b9628f5badebbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c111b2b53c3eb4ce6c4891b1aeb39560
SHA1bd17873c2cf7a8352ee8328516552b60433afb4c
SHA2561a73f1a26de656441a5879b53090acdcb79d10deb59c5d63374dceef1e35a8de
SHA51230a443f085437b43436cfd4b72324becdf7f4e73c7b66ee1b8734666d3c9720d0b62c0759bdf7a5817175760c0ac94091f8224fadc47269d11af4786d79df711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf08a51211678084a27941d0e74a72a5
SHA18c226a9840930a4b1cae4b29539fd32113cfb0eb
SHA25612a1747031c682147f20280b10c33d300bff2f954c9c1aeab3b58082e2a96a0a
SHA512006eb91a8c407c4e904fa7a92d0ac50afdaf9c9093f215f087f0506171e5df37794ebe46ddbdc5b3b81140ec797ef5da22f7b5873de5f76a22085501bddc2b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ce216b9aa3a3357085d469b87d76c9c
SHA18c0367b9a319226f78b3c681e6a711754b22c332
SHA256d8f8feb1104d647e8d573380f45f611da38cdc766558162a1df716ea7c7a8203
SHA5120fa47557d78ae2276603f27bcdadc66e356ab029486caf59811f9c6d6cd464312f7cb6f231bdb20475ee19391de892835912e418b4c4de6572635c3fb2c7f881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5244ff1a3990d5019b85c04d2305e42e1
SHA184d6e049e1af06e058297070ddc44d75fd8e96b1
SHA256184d5b54aa2c6455fe3047b70ce0a7f5b4c4dd02b94e942ed36bdcd3d0ec1fb9
SHA512da1e5da13bfc744c5fd2b276a25e59413f9c317a070910c5c3985abdc4b922a5667396756efbb23f6e54c8de0a1858e6569fd9dc7ddacc34b941bc706b482861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffe195c32cad9dda14e20e048aeada2e
SHA1d234c5fa1eb3b87d73a518837c443f6ac1548868
SHA25670b2870b8be04b881a8cc53390b7cc59ce407ad29677c623fa244b4d78d1357a
SHA51273b6176f31afaf59ac76aee958a55663d21c6a364faaf0da8d14598f2740f69313c5225730b32ec4e7f2da8d6514c4ba37e14efb91cbbe8c6fbf4ed3538101c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef5d72882e8d4786faaa183f27c9f452
SHA1ebd4efaff68f9fe75fccdb25539f12ac2b5105d3
SHA256fcf3fa3fc29bcf508db667dbac398cffb5ce3e35693ce66fed746c9d3ba7946a
SHA512b2818a841a285f7bef2847bb5019befa6441ea7e8e3304f5cbf51f3dc69f7887c5e9c27ca5816093404e79a24398f8afc28c85f04d03bd65569f4474e17e1594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d78a8d206f1f7019ec4132d045896a8
SHA1a116e0ef4a26ca18f982c7520273a99f370c7ae5
SHA2564cdb27a7a61144249de6e3cc9383803a1529c90c700ef859e2413385c925cf8e
SHA512e1918035901ce256b28c848411a83b070424b796d96217a68a802a15bf7eb1cd84eecc0df8dd3fa6415232f18366053d95c533a4f7d47bd622aab93759538730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8dd25843fc29d684d5127cfe8f3b99f
SHA15d0132399b018a66002bcdb4a4be927c7032c067
SHA256a1a99d3ff672b8386ad5e45d15508faa078822d1bc8689ef750fd2aae9d7ba8c
SHA512c8ab74c874088e1207d7e6304d2b28c6a0d386cca757581a46637dd3bd13e3458c3c171e55d72612902b65584ce2be92a30975bafa11977026fa3be56e666ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1327bbbd352a09a79cf8acca17b1d9f
SHA1ed4b392c96e8077eb0c3bbdf365ac900b7a7e31f
SHA256e9746fff2af53cca20a61c092d968bfa1760dd760d15506b1778350cc741f2fd
SHA512b5be52e33121bd1ce886f9cee5e0f444cf72869a9c89d3832b90fb1830e4d36c6d8b8e460ab70646e26f61fe7d3a7d9725a27d221ef39cc8909e85f6ab31ba1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b094b7bf5615baa25cbd4dc336e81fc
SHA1b6c64cc5d01fe1ad4652001cd02daa4d42b9b6a1
SHA25603bb962a5f12f5b2038548141b21c3dfc02e94d645688586b75f470290c19597
SHA512d48a42ce5db740620e9fb644e9892fb96d3a30c07b9407a06df6e0b9af97e5a2b24920c6d7ed0aef59d96e50c9331124d2524d4206a27efae30eb14b6f878174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5924c7a0b4721786a79477d9b8d633e7a
SHA1cbc05a8d26a58d8fd68c03c581168917c6a469a4
SHA256f7a0d15e383ecb96516ac77a4dcb247a395e875c7df1289f7285fb0dd54cdad4
SHA51276a3dde23ec240a1c7e89faf92f46139d2eda2f2381ff6f69fa223540338385bbce5b1e6a3a3f4d444a747ec27f2ca13b85702d8b8c0eb481b0df2270fcf87df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d80832211bacbd923c6dcecda12ebf25
SHA1f091d423e79ddbcc46c3ba1fb054fa9cafbe1e1d
SHA256af520ca920bfc62f47acc86a02a0e6ccaba0e3c9e5c19fc4e010c0af134ea692
SHA512fca558f9cdcca1275124c96deb541091eb085e41a67ac2e0a5a89edc6c31019d5ddd1448f86286582fd86cfd35f877e3a6ef45cfc6c83524b3c6df4fbf82cec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b26b1c36136e7eafdf08c67be12546d5
SHA15eb4adfee6de7d712b17a82cccda70908294b60a
SHA2561827b831dbf5e075ea2ffa37b29432e3b99ac005c5d1fb8105d3dd6106b0a034
SHA5121413226f855cbf5ab536e5b37f456460430a9daa387312985aab0bea9f89366be2a9d7b4fa913b8fa15469bca1ff9bd8186edc9cc29bbe3857ebbbeeda73b3f0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b