Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
3ce57be42c1270dc6f2a5a4d6f7f9835_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ce57be42c1270dc6f2a5a4d6f7f9835_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3ce57be42c1270dc6f2a5a4d6f7f9835_JaffaCakes118.html
-
Size
139KB
-
MD5
3ce57be42c1270dc6f2a5a4d6f7f9835
-
SHA1
e4d009e358dc50bb0f3a71b9cfe384e10717af68
-
SHA256
3495b0ca60ae6733a42012f69dda1143ac76d5e38354df5de9c7d370d010ea33
-
SHA512
7f59abb82d2eabb0fb71c8443a24fe494d828b2f0ac7e098735d5f9190fb2556e1dc28acbd07d29592ee997db283ef1f3db305692364b6358566f061d92c94f3
-
SSDEEP
1536:SiFpwyIdx+mp1O0ni3DVJlayLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP06:SilDVGyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434942355" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4024cae6091ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D07C83E1-88FC-11EF-ADF1-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000055e7c543f839ed1ee876e862593296136456b6e3cdaf399470932374c8908634000000000e8000000002000020000000fef69de5cb8449a83b6ae6a5dfc0ac9e22abdaa0e549369f0f381d222c0e81c7200000007c4093f2e1753311da4bef6e1dafaf00ce24b9bf54446a1b4c01e580c5b53abe40000000c7107e0540d029ebb60ea4c84369eb119f1b0c0bd22fd7c7d0547970782e325712ac853b463e19ed3025f799c415e9821df43adcdc6ec6f0111a8d4c40768917 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2640 2112 iexplore.exe 31 PID 2112 wrote to memory of 2640 2112 iexplore.exe 31 PID 2112 wrote to memory of 2640 2112 iexplore.exe 31 PID 2112 wrote to memory of 2640 2112 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ce57be42c1270dc6f2a5a4d6f7f9835_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf6f043646abd51925b790bfdd88b6a9
SHA1cfcbc9851fdd6096333d48d90f0219633887b871
SHA256b9f2d72b410c618784a98bd5abab1171bffa1744756bba6f94b94d6c97bcfec8
SHA51278aebe16385e65af2c2b9086d64e42124fd3cf10de86de4300efa30283555cecbc2eaa284977c7388beee2d0ebd393705f0a0043d40cbaa37ad55a9af66024ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f6318dcf3dc755801f2805201e52f92
SHA1713c77ddcdeeec325c842f888e018cea974a7a47
SHA256a1588d40bea18c37800a11837781dc793265cdef80aa591251ed4c10e1747ed4
SHA5124587c85b473365f11decbda1343800b0b9dca61a903d8ae154b96f8a83fbb7a70ceec4ab34bb43ae797b81a014fb17aaf97809720eea32ddab046f4ea5ad711f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cd95b9cb0d07586d56d6cf1cf4ff745
SHA1402b6c5397e4bfa781dde39ce8838af410ba7f33
SHA2562b044962194d3174cedc1329608fbaa4a50d9cbf56a6fd8f192026db83789fb6
SHA5121f277a22aa2634e9f3e3ce0af57e66840d2e0fead880bb3e170517125e63f1d4e237bc2b8b1501e8dcd039fe45d488709348c1c9986791f6f3afe0ef6fa07b69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544355feb7c4380fa4791c609b9788912
SHA1dfd5b9fb4346632b8395d436cec5d7bb545556db
SHA2567e441871d765d83cff6d372212c55588c8434e725a991d3f85abb8fb222c4de0
SHA5122d2b0fd6bf2e3da33b9ddbb23aadca6c8a630d22e84cdcceb0f69021e7a56de168e7623a9188abe841497558ccade04334b65e9045f08ffaf8482f64fad222ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e33ecbf33ac262f10e8324f5ec6fe65
SHA1d8436bc968424285fe4e48ff22d78adcd2454f42
SHA256e90c5b4c07021191c708f28fe88ea482d0e23f5cf4b95d7304a0504414558f85
SHA512e357fcfbb1ef3284240525fb8a47f012e8a8a0b8a7b881cadf7e51b3b081ef8738280a6dfd8a37fd6df957f451b091545654679d1959c051253fb0c863bb6a32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155f0c1f9d2a6b3c9ba2702654ccb552
SHA1b667b823a555041000b4deef5f70c967147937ac
SHA256af1082012f9d06cbe346aac375e435b718f0b7df54db404eaf2979d322eafa4b
SHA5122bdbc675a0e1695e3deeb0dfa0c4609a93c597744099390f52d6c1842c2a8824e069e808ff2282580d4f6e8b80d14edbb9603c6496c7c7a193105883b93c8cc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b888e2db3dc278a314936b50566defb6
SHA190942c290095c147c5c523d2606e40fd3ce6d51f
SHA256e2bf7c118798e6b57fef212b2778b5385823131f31e68238310a49e4ca32113f
SHA512b11bf5fb40645bd010a24b3a216c77e5575814030b0eda3ac7b79fbd72d7556b183ad7f2525667a05f3841413284f7e1e0b5c5c9f0594809f4e7b75c28b59ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9b894bd3147d46790b7b3171991331e
SHA14e5f6436a829ed3b7f16cc71f4b363aa0ee8ae40
SHA256d191d42a125bcd37b750fc751c8e667614ce52049e6592fe1015ac111140ddff
SHA5120120589777d8678cbfa94cffac003a1bc6973ef5f1d4a6dabddf0a498f83debc066fa4eb14f53f5b4704496341a99ea80501cff8a246eef27120e084d297646f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ee4a7c868bb169eb0167fbac3fb5047
SHA1346d17f8cb4ca4b32702b0edae39cd81076b3bfc
SHA256fd99cf8da2c868fa02db098764bfcf29dffd23dfb4a8bf939d21a571b5a1eb57
SHA51252e7ba53fcf6275350691a25016d71b4acfec7dc8dde378666d13f0027df803b068c7620d284889cb9efb2230d987cb60844c9b449987e6f614db50e9c696922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5425981e7d82a2b90f51f86111166b57f
SHA1134d921f81d7ba6709afdc9a31c55051c760a46f
SHA256a5060a73ce8dc0a4a994b9d8a9d1814f4bd3372268ee4822fa5586ca1f5787d2
SHA5126c8d1b67ad94bbc9d0e3ae5bec1c82c13aed2530c20ea81d3a7d0193d02a8f1bf9369ebfd2b051309f96096a7e179de07f52fcdd3fb8d9eea825afbea6f2d615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543e7ed7204e35ee9771a5b803f455d57
SHA13d5e48a09775fbe43cd34ce69e69f36538b4ab40
SHA256cf37326ed1a28cf3d6584cc312e3a5bf20d539995cf6bedd6e3a1f2ba1dea76e
SHA512c76ddfd106be0151a6b5ed0462bcc94adec8b8f5cf2d1ae54a83aeec2e4ffb1fca6673588af4f0b438c3ca59e328fa9b06fbfb9ed57977f097203183e4eac31f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b22b736bc842f0f9ad7db13ceaf68861
SHA160dcc2248c01ba28f7c2e347310d4b97fc99a04e
SHA256141ab0adac2649847cd7b4d128f622345b5d61d25f1f7e235d0c02409202b45b
SHA5126ede7e767026a10334ff350d3520dec328b198d01602ad805ef8515332d82b6c025a2a24e64e99da16f3e542e6e810382b4f55ba90dd97521a5a7a7d1e5dfd02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c770d6a8604f208388a9bbbd44c93648
SHA1aec0566324f8e835306a0628657231a11af6728d
SHA256a4bae543a059c1099a101c0862acf85c603eea49e689e059692a67136a972738
SHA51218b82b7cfc7dc959d7bccb8843efe46a1577faabb48b0dee796531cceac14aa174e76d86f54b4e77e2e18624dcae2f4ed50889ac7597462bf768ff114fae8b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e603a08505fa59a5439978db25186dce
SHA132d5153465e4dd64204110b7a9c4f4b36e98fe7e
SHA256b1e28c937b71411e334ce6d52f52cafa718f29a5be772039c92ebfce09c58982
SHA512d0583fa8d4d79038c584621262e4f74ad42d4c8c63e4b36084975108ab499bacfb3bc83f6db894ab6f86d0459256127c8a305f1be878e1586c9596919e08b9d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f816dc3e90a3dd5092bd6f01d366cfb
SHA1426ff4fd6ea4505deddc5df71424106adb401e2a
SHA2562cc9b67b507819fc936d4a7f2a3548c531895192fdd2ddc12a8e88885aa86d02
SHA5126336fb8f928b16140eedd64da94113c220102daec97c3f208c714e8f1a88a67a3a45baa82db413b8d60b2a21737f49cf2716febafb71d6d854eda359f8a0b891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c48ee98423290dc15704dd707ea9721
SHA125a2e400625d99420273bd39bebbef5260907dec
SHA2568e58b89c6fcffdc17b9cdf206578dbe7b311a34a07a88b87965c243ac1d78e5d
SHA5122ca7501b53c1b7a06e18efc2265c42c654b7088606c11e896332de315e9a0a285949bebc3ffa54e2ec9750c9304e8d368548bb9d834bfd4ee2c75bc60f2e4550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd6630d1995dca1f9d8d035e44e29928
SHA1e54d040c223a86175beb83e878ad359ac16d5fb9
SHA25617354ec56d0f16b615e8cb6ffae6419bf311fe4971a04e86004ce04553a47bf3
SHA512f46f02e162082767bfeae6aa12cc1beaff2df340705a61772d5ef27c1a2b8f87fd8011c9aefb39ab29ec9d9fdd49e5bd734cdfac61ca21b0f4aba8448393ac87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d9fb492afbfb8bd3830b40062d79664
SHA12dbdcd925b70d3b9f9d432d361b4bdfcf828def4
SHA25678efa610433226c89d893aa6217afc481da8c55fb5b7e365a3846644c855d921
SHA5127407bcaddb76f02015fa7ca62821d1cdb325e7e6b027c02c72fa3de0edf5de69af9ecf388d44cebc9fb1cc639a09d0eb3dd3b0630ebda856c06a33632fc95dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b5c71d6278694d8e19f8c9a36e4d048
SHA1ce3d09205e55bcdcba0979abbc65ae22b2380c1f
SHA256a4b171ce6c07607b13e3c75571c527718dbee7d0528ca3abf1d3d8d441dcadfd
SHA512c064df8adbf5c04aac5f71ad6598b8c85cd3efd3858acf2db8d5ef88c5bc266f42f1de76227c5cc12ce7cc4a55d67937315f2e0f668bec5127cb0504174c6d86
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b