Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 20:27
Static task
static1
Behavioral task
behavioral1
Sample
8baed95b20827e675e74f00dd0e6bfc6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8baed95b20827e675e74f00dd0e6bfc6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8baed95b20827e675e74f00dd0e6bfc6_JaffaCakes118.html
-
Size
19KB
-
MD5
8baed95b20827e675e74f00dd0e6bfc6
-
SHA1
1812bebe2570d4a456d443ca99ae237aaa281fe0
-
SHA256
57c89a82c33f6eb94cfeaf22fb3b1ccb04676796af9e3e671b7b1dfb3d57c591
-
SHA512
15ed208aefd48e47c120f1222e2ee26bb8f31687a61529b5f9a6d05f437ed088699f3272fb40fe1b46d775f14131ec0b3a1ac4816da48b09d5881f7037f4063d
-
SSDEEP
384:SyiXCCCBi6LpB565Bi6LpB56IjBi6LpB56e6Bi6LpB56nPBi6LpB56hBi6LpB562:SyiXCvLW/LWSLWesLWpLWnLWOMC+jT4p
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68995921-2055-11EF-9667-569FD5A164C1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ede63d62b4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423435536" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000129965235f3b9a439eca6d8bb1dbfa7e00000000020000000000106600000001000020000000dccfc272e21d2e8798dc7d007f76c3b159c631b46649f4fa58669f6880d54bfb000000000e800000000200002000000087c7312516dc900e37b7eaff1c82898d6d7a466e608f7df0ae78e957b421ded520000000805d75df52d22011e7ec4d1bf3054137ea72ab370dcf2251d63988fe6dbe1757400000009d8abe519af10758ee7804f6314c14e7cd3789c84aa16e2215d572b555852eb928e8bb1612b0fe9d95e48a5090465f5d6c1977e888507caf71f9322fd12d867e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1636 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1636 2344 iexplore.exe 28 PID 2344 wrote to memory of 1636 2344 iexplore.exe 28 PID 2344 wrote to memory of 1636 2344 iexplore.exe 28 PID 2344 wrote to memory of 1636 2344 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8baed95b20827e675e74f00dd0e6bfc6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e777bf8b370187a363c9b0b26aee322e
SHA11b7ef6aefd407abd0aac0cec1d03fa06685c88ef
SHA256f73637c85ad49cf57a959e587a88fcbde76c0c199878e5561160e37777d75d08
SHA5126bc97554c7d96de056c41f27dbce7519d11458511705f5b6fd512faac5b7a0ac2a9bcbe2cced57dbc03dd7b2c9ff9f17106cd278ae0ee2848535afe64f3eab00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f5d65f956f5f24476e119c7f9740ee3
SHA1da7ae71dd2c8963388e3c7d4dc9971b4e24df8a8
SHA2561b55f336a7e0fad0ca107a40267c15a5ffd196f762da41e99ffc4bc866727eac
SHA512bdd80e995b36622bef4a1241d26dbbf11f5289d4c4139ecdda97c6acb1cccba96814497ac725e5a33d26899ddba583a746181febcf75db026c8febf3ff27d9b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dee2ebee79617e9cedede8b5140259c
SHA181b8951d3603ae89bc4907c9147962ed2401cacf
SHA256d19dd2b8058a07a8aae3ca30a9ed312fb46670ec7f63e0e14ca246c3270d0576
SHA512ea90671a287e6a160d59497ad0b2c044602ddd881584bd102680cacc23ea0e6fe7cfd61c4fe8161481572c49ed5ff60cd64185428de213e1cafab1473873a486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c37f2c180fb8fec7dc71761c5dcd4ea7
SHA100a0ffeba6acc23311c3a59759ac1aceaecc1df9
SHA2564714d0587b6f5f738216a755c8c7c476f7241c0631a1f5fc453a6d8e2a2a291e
SHA5129f9f31bb8e9dc563ac9e8fb5cb246e8ded430a5095dc78ac2ccd71cb2e87179cb83a66ae143ee587e274fb1441fd8b8241097d2d79287ac4a45b6636acd944f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e3bf48c25502972430eb304b00bd1f3
SHA1a63174decbce4f43cd88b5d785d16da547687489
SHA256dc9e0906d1d7675ce4cdc271a28223c87e650c079190ad2d8ca5b6e16518be5f
SHA512dbf4c9cd43b53af5db37b862d3e716167226d5edfc5315e01d0d04a24fc719225cb5cf8ec9f878a53c5ae221b7b19253bb17d47bcbc2cb7670236dfbdb6121a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5449f45f88e31b8964e98b7bc0a0347ca
SHA1e380a91ee09884587ce076491611ea6608390c04
SHA25688f78e326246e4bac9353562b2c20f3549dff912d8550538b406657059da18fa
SHA512f8570a8a2ff5c43568c5e14195e4aeefbcf526aa2ac9507e56659f273f87cbb11573cc3ed43dde01858a96080c134d2941b6721b833485ae65835fa3d18311ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c00ce411933699348492ab885478262d
SHA1b02c5cc21a387054bc24124c40dadfa96ab8dda2
SHA25668d3d3e36635cfa3f31ceb61762caeff34e954a4bbb0398075c25b2c13e9aa7f
SHA5127a881d884e4d3037195e9971da276fd6cb275e08d6900acb75418e9b44bde8a8fca2d163818add93ee847c079722594fe7130d717aca6630ce17b1beec4a03ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588e29495e9a606fc21de2da82732ff02
SHA1605718adbddbbb1d3e4c67ba39c9d990d67767b8
SHA256661d0585d7d04ca3e21773f7783f7f2b97cbe532f6987f30318d8f36caf069c6
SHA512ce62654137246fbd7b689af34b097ccb024a693969d7c24acf6810cb26a7fa2762bd285359e59c3cf70ce94c701252c88b6ed60a7b67a9b68c572bdb43ddd3b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a76ad337954fae058944a874ac1ec191
SHA1ecb9ceea7d84f3452d61380bfde198f52ecf42e3
SHA256d14e8c96ca86cc3813b90c180edb24ab8916bda45bd8d2a1ca0fd20de632dd8c
SHA5122fd31dddffedac6dc92bf2254d585181c21b03eda946ff021c21691bed6a1158ec155333f9b4d4fe6eff080f5b70779be207d900b0b071a8271927ca63e1013e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d81073c615d922d000bf29e9311dba
SHA17fd27f5e1f72323c9b1af7a78f711b981010d7ec
SHA256e2a65d421442c413f4fc2f44623b2e25cf4feed5c3865984eaf79b759758e44e
SHA5122d66540113bc2c9ed2338d220e2c76d64d210a853099307fe1d65ec7f4a0cedd1a88d0780d4eacd549147fab364698b4358ef4c3974d53ad057747315e91c64d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb6ca489866b4fb33700d6ffc669fee7
SHA192d21b488cc8647dc796df65c10f437146d50cb8
SHA2569bfbbf0cb3090e32f4e1fab1b017931ab3dc13d39924d1ee4a2ce73bcda6edd6
SHA512ef87f0af998265248e146ecb2cf814ba8b1f91305701780aac3f4437309acce4333fffd48827c7dbf088d373384dd4f9dd3ebfb948025cf075e91507ae396f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c38df16d5df2f090357f502cc65ae8c
SHA14e405f9e37dd84222e40ab0f92337bac2f466d28
SHA256a4646b9b09a4df273beaeb0499ac0d5d40d9139ea17fb6aec1baa0b1e3cb7118
SHA51262b3478a9172b128dc352a1b04014dc663a708e8020cc516a751de840223017c2cee08cf345d66c2beafcab11f08ee0b6943bed287285321691cd51af4e594ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbfac4fd5aff98fe7a4da07079486ae4
SHA16b21c9b44a53064fdff7db98dd9c4fe0c4347ab0
SHA25688e1991b6a77774f72956f0dea01a1b04ca57e9a39e749219d1438c8f7303c68
SHA5123a91ad4f2dc3915bcfcc1d42f304f3c9ad330eb86c7d9be1dbf5d2502a98dda38e7a6cc6fc99a85164b5d5b537a8c8e570093820eeae5e450f664a20aabbbd37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf7ce17c6608a64ffe02eeffd8a7c16c
SHA1500724d706eb8c3b2b63c216341f1db36e8ab8ff
SHA2561aa2321eb2d4ad1b66a031ee755ef0cc3258a24e76e8f4bde8a47e3ccb549e92
SHA512989af51dec32b9af73a25c978ac3279b0128bb54bf7a545abcc304f72825a4a2eb83b62c2acd4c517c058c1580ebca2a3dd7c011dd5977ac50ed8679bcb4142c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529a3310a1b2c457fc89ba3b171032a5d
SHA1e40dda4d429b0cf52f884b60c7672b0aa658acc3
SHA2567be164690526d28690271186eb2f26486fa6302f9df4aac5cb6df2a3c46d25a7
SHA512844ffeabb4ee64c5d374ed81039c57718a8f862f37e3ba80b740db13e7ff98f47947063fdffe94450d06d12158a7dbccfa9cf6e71ae996d443c3f1dd39989365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c2285c20ae21004be31d942acdd7408
SHA10faf3092e3bc91fa96e07e32fb84ab54d3673272
SHA2569f815fa34b4dcc01e2e373d07f26cd3ee9438e57fbb074c1f09804547a1b0b5e
SHA5125e943848bb29681e13228b8221f53813190d92db1862bb70cc055348a5a767b6efc43f35c3f086b3e69e7fe617b79ce681f89f11a2ef963cf25c33c6821635f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589ae46fbbece32d68cb09c513a28e203
SHA1a4f4ec2227910c3b1803db4df44a75f04790a067
SHA256e764a92facefef2eeef556064075b9614b06e775a286f0eb27fa7246be1fa651
SHA512065ce4ea21e591f6bae0f91e8363fd26cdfe3e93cb5ac30d16853834d7e0ec6751c5441268e90835183cb2ea6bbdcb033f846f6587aca33597088f08103263fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5772e4e5e1e8616bbf70986ec58e0abe4
SHA19407a1490aac9eab54bd43d2614164a99e802524
SHA2569c96e1b32aabf07665a09de1b80cd7e5a89b929b11ea2cbc4b6a8c36d69b2c26
SHA5120dd2bb5c2d18a45180543624bdb0e08ced31dfdbcbcb8e3363d5d864b43dc24287adff6938175c8fb165e48993f53c2f051b2e9694feb70c40be56e4932c48de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cb587d6e3c70b856a7d2d8171dee503
SHA15b5105ccf3a2c54b61b85928159f8d87fab47bb0
SHA25623a2f2e372780b1c220195b828956a6e0100f5924ddcdee9b9d30c2b4e839119
SHA5129f46e746c29ebd6f92eec2f088b7e571a10c4b4fed64794b392bcc5496c0f10c5d63269e3877a5c70a0a5ff0e34375f260896e5603cc8cfaa3bd949d1676d361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d390d645ddf8582e358b7a9b5cd4cbb8
SHA1bf223e214c52c02759b3f4082ec10cc1d916d3e7
SHA256594616ee9da3c206cba6d72a5bbb4c3573a310ffe85b0109f474f138e88843f0
SHA51242601e030820a54219aafb5c7347adb5fe69b3e864d8593ef6343b34c9aa235d0feec6782b9662967ff1107f5b67d304787e336c282ab51bfc2bdcaeaa5e7057
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b