Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 21:17
Static task
static1
Behavioral task
behavioral1
Sample
964a95b4be80950d6f7c243eedea3f05_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
964a95b4be80950d6f7c243eedea3f05_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
964a95b4be80950d6f7c243eedea3f05_JaffaCakes118.html
-
Size
16KB
-
MD5
964a95b4be80950d6f7c243eedea3f05
-
SHA1
9d9d1f71ca51c0002c6ddd2ac4074acb904922cc
-
SHA256
7a08986fd036c2fd56859a59b6071ee95ef12ea338f698ad93aa332235af97b9
-
SHA512
4164e29351cfbb29363d087f0cf324f12472e99bde0fafb0d44461ae18acb7ec545d7ecc4a4b17129d27e10772fe2630df3be1eef65d2d3a1d1a35d9cc054ce7
-
SSDEEP
384:odVm6TSdS3XO/snGdEihedjhuzqDxJKLe:AWE3OsdiM/kLe
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423697745" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e484ca0bed4b3f42b4d295b2a6e636bd00000000020000000000106600000001000020000000854ab2ab1d20abc58d2f9e3120b84e4c0444497ec307ef2eb59f88573618a77b000000000e800000000200002000000054da0cfb2c46b4808132348702a81aa8a5a08c6d657ecc90717211147712c8ce20000000540a372976506f03d51e858368df0736985b6cd52546f0e4372c8fcdcdc4708a400000007b09bfd41836a385d13e533f8021e7ee8b42bcc36ea886f26bddc3b6b3c372f082757526b0d1f160479b286b3d203a65c26dc6d3b3977f433917e57f467589b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e484ca0bed4b3f42b4d295b2a6e636bd00000000020000000000106600000001000020000000190a0c0c6cec7fb6b2046d2b2e559c5caf85e8776d248c8aa6e5715574f60627000000000e800000000200002000000001a9296338970d21368403e89ac8c789dd44973bc7d608a67dadfc5c0652fd609000000083d79931308443c416657aefc23f822e4d3cae76deaf0d9cf23287c60e571dea4a4c83bbb87a85a546f2dd411583a8215c092f4b5ccefdd0f3966237b72d76b8613728d5d0f97960d978a0084a1f601fc9a99308563da9641a0c55d610b1e2632b548ac28ed5f668bd91bff9c39ce4d68c6cc7cdbd418b9c64920d21d805f161a1ccb51b7ab86ec2a804466696ec933e40000000561d45a98f2994df2e5dc2943413fb94442c9910d6d87fefff9bf5f67a667aefb2347fdd66291d51fac9b805d95a9b2e42e51053322c2111c979f4f153308c61 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E8ABC711-22B7-11EF-B35F-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 008035cac4b6da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 784 IEXPLORE.EXE 784 IEXPLORE.EXE 784 IEXPLORE.EXE 784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 784 2148 iexplore.exe 28 PID 2148 wrote to memory of 784 2148 iexplore.exe 28 PID 2148 wrote to memory of 784 2148 iexplore.exe 28 PID 2148 wrote to memory of 784 2148 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\964a95b4be80950d6f7c243eedea3f05_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eb7060b4b9133950def46a0df11c347
SHA1f110141bc9dcd76cec1a5f480f51608d065fb158
SHA2560ada2c4098ee1d8baae880418760b19e4a0cd5d6a4ca476d8afe686991fd5a28
SHA512ce2e81abddef4833c5df6a9f84a07897ba281e447732c2c6377c3326df89edb9248badcda0903441bda0a41d6b3b9c0f4f67026d3b088c8fcea0a23727606ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5605c60afce8c7314bb42f26b01a01d2c
SHA1b35ebd4f9cd0f334986471617f02b6e3985fa387
SHA256af2e1eb4b36d997927c3ff288110236bc47abc9bce0b77e41f88daf59016e4a9
SHA5122e1594e441b6f33ba14b4f9dee510ca152a296d43b0bb4a899e2853e14974e4e1d9746301fe0aacf90ce6aa8c2d0d44a782d005e1190ca274435b0dd1e406857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591ac7104a5fb9ef6cbc2d2ab35cd7fbd
SHA199b790743e2790cf27b4d9f0e8e9b75158cbca52
SHA256102414340fdc98bf9bd33fa027de11b27337b58e58aafb8e99ab23710ecb26e5
SHA512b00d1158c4ace74943a8989ef9f2bcc949340a83cdded53fe3159707fa7bf460af059214b3e65f741dab871648e9aebb880f5af0a0fabca01d66c24df8068b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afcc233bf79b52922c2f5507a37c8a47
SHA1cb0eccb919100a0fa4ea6ed57ee5d3d156a5a815
SHA256d18436608c89ab42d14eaf0b8f06f4550a120a15fa5c1f27e2f9606e5fbd4add
SHA512a2cfa1486ef28378ba077e32635ab4ab89a4590f4e2f1d7cc8e376428ee618d80c22fc57223036a9718c5c32c5414616da0b71220f1a5f4db9c2186cd3a806fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526213d9206f615662777aa1e0b46ae96
SHA19cf58d91a4c96ad436b7c920f1b1658921f9e493
SHA2563b3cdda7c3fe3953b27981eeb05ffdd9c65ead13af8941febfeac6a06067aa82
SHA512942a4a21496f01e5676701e3d50f980ee762bf9bd1d7b0bd083a3a1b6ecca25a6ec66b5a19e1534fef4ddac5284f70e1131b9e5576d6447b0e3db4b739254999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8340c02339e4cb8f47cc4adcf564f4f
SHA1bf1947ec7931e3161c0c1a4206f9f17f36402c86
SHA25675b5258b34843786b18e8cfb11833ead55786c4a3d9dbea2e80ea6daa02969ae
SHA512ba7258b999c2d27b1d5c5bd1c2ce5e30c6ef97ce5a0ff6365a2d4a6de84e0a8428bc26c93715f5e886ac90e9f5c52eeb118ab67defda02eb8dcfb354b585ed2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529ffa97bf3978a6d61839f268c4fecea
SHA16e581e23884c4198ddaad69ad5a91ff6d4664dc7
SHA2560853bf6b0df9b9416903bbddf08bb1b8e4094ea74a0ae16bd50eeffe9580e5a1
SHA5123471f91de14c88033d9e3a17a4b9e1638c3405ae8d2d155c7ed07e2694c9da6f1077b744de98da6345a55d9dc3e909c8aba648e8bc748d2951a3fdeea752905e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565d08d4c729a8f1506747d71d596b06b
SHA1112f0aac6cef99091f339cf6a60ef1fd8095e6b9
SHA2563f7d2df9c6fa79e8fbfd1fd9b393342475a97057dc1e5d6596513459b0ed890d
SHA512149e1fdff3aeb035633f18e5a51d7e86a9bd3234b30741e360fffbb334603af28b57feb61a93ec637963319b3fb22d253946545ffd13dd73291a62587f9f974f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe9335d029bca6736218a3afda66a3a
SHA1048f86849c31998f6f6af8d82e876ccbf9fb0fc3
SHA2568187d81ce466e0a6a8da6b9e0cd37c6109051da22ef2e9c16f9eba466928e11a
SHA512bfe327e0ee923f2631eb9400d0979d85f355cf3d596233bd94015219a7539448a8b2e730007d98f79f556b4dcc9ccce3b8788c4be0ea9c4c28b39f9aee472a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb5e2102be167cfd8107ca13190f4948
SHA1909400c748e7fe7931d2979208a8792f61a46f29
SHA25631f784b66eb9364f58daaddbda93f0aa4b839a27b8acd667afa6e00f4dc71205
SHA512a89a9bd3045f6503d440c5f2c9006520747397e84da99429da1ca33745d02285905d62cafe3b2cf29c4e30b2caa3450ea908054758bc97ace95cc6e91b494c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e7392d6eedd5e271e8422bf607685f
SHA1c99ccbb3a39ba210674605473b51b5b160bf2981
SHA25625dd4693d74efbc4db9ba763233326ae0d467e9601cd50aedb5bc54cafe2737c
SHA512da09b2fb50957fa1b12871798fecb0c16bd987e66f33cc64df0b7601f0be03d0a08979cd8af330a65668c24a5aebf2ba3240f7e029bc7ad01738ea8c9fdb0988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c07dce05657030308464349c5a2e2a33
SHA16f7c1022f7ab9e184909019e9fd1cebec755342b
SHA2561f1363136e557b0e7479776baebd0699921b473a08faadcb8210f856cfa3308e
SHA5127f207df56f936c0cd32c5e943bcbdaefd30df69e8963fa373aca3362906b4242667ab326a38b642bf895be78eb6e378812c1e19c64568cfdd2c5abbce0dd32e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54824baa4c1a954f791e2c1f90bd303aa
SHA1619b617dba0271fa79f3be95575ee7f05b23bb5d
SHA25608a8a131e315da610bdeaa8c58104cf750429c9af896c7d9432a658e9e739c04
SHA5123f59c8be556cce67001b44a7c680657efd49e28a00e6cf54077a19030d22f3ebde0d330610d26adaf2133edb2856c3bc910943f69c32e384bde773ae53dee364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf424baf031c79986bd9971b1e794a5a
SHA196715977be47d3898ec004d591ccad18dc486142
SHA256755417523edd5a42b779de41cf07a992a8983817fea5f383f814664a0705d112
SHA512e88a3ae113359178a3c9777f8ca92c1287e9bd69e894d12f77f05a159107b34bb22d2e3d3b150cf4901cbb913ad842be4c6d5b7aadca3c47eea73e99d8f737e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5092ef0020d3b4ae65d121c016dee70df
SHA1cdd5d3728c8c9b54a84273ecafaea1ab5905119e
SHA256231d44bd91c6e7baeaea62e243116041c93724050fd9b602146a5a0dee9c9d91
SHA512b7d078a347468a7cfacae443bc9f855663eee3b7d9c1531e6cd7753a48a99ded068b8ab64698c0c6267d04fddb40ca09cd36bf6b691af6c1495abfb0eadbdfea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6ed7257ce1580a7360d62f61a592ad0
SHA1fe55c2caa1ede561afe68b047c51ca9e7a0e1376
SHA256b4cbb1073b948d0d7028fa5e249788e482abe70ef8cfb0588bb598814fd376ca
SHA5128e7b7ae8a3c662c5baa7a890f597934f4936d186f57b5d862558e8b62d1d4bf0a81a90b9c8321430073c15627b8721b40af1a48717453fb9f011582c25f5f4da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cdc4627de75b1255e002aee387b11be
SHA138f35b789f272255ba7f1a56a60ad551df8420f4
SHA256d411ba6ed59d8ac99768d3d0e372216d744015f355d1765c0df4e0bd85b72e0b
SHA5123f3c3cfd9773631aa95fff0cd8c93366f7420dba92c4cb096d6bd9975a2376f1d2ace705f421d152d8148cf21857c5a1e8b0b06b766eedf9d69d4f223be354a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53acc19ca36956472040047d4ed878f19
SHA1cf434e47347005ea507bfab17d48075c04378d4f
SHA256524250a6b1f5b680e0c9b353ac0a12db2ec9b82dd505c5e5457f1933ce8b9d5c
SHA512716b7eaef1be0fa38aeceee4a957137098901d3882138fc052fd19c22942b7059ca65daf9eb18af81dc6dfaf8f0de8bf0df756e68c53c192c83c16c1cd1aee9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54770866e6335b8db462198c2bc49d460
SHA1e2c6c2f8b2634fe5a9eda36dc671fed72d7472d7
SHA256df7bb5d391375fb1901d8f3cea77c1ed0c56bb12c69ed77ce133df7f2fae6211
SHA512d8297e036e3c343320e386f8a2fc705ae851471a5cb46a913e3ac9034c887bb6e323150da8e95e0f7cbf0140c932fee8354fb1f2cde1f69c9eb8f788398302f3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b