Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
0adafcd938c09833a8f8b4b43e34c14b_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0adafcd938c09833a8f8b4b43e34c14b_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0adafcd938c09833a8f8b4b43e34c14b_JaffaCakes118.html
-
Size
3KB
-
MD5
0adafcd938c09833a8f8b4b43e34c14b
-
SHA1
72992578b01389fbd9837a09fe51c12a1ba7cee0
-
SHA256
d4801be7e465a41d2be5467b9384b7d5931ca6590215aa38962ccae434a1993e
-
SHA512
60ed012dd561399e39471165d94dd081738b33b97293acad1537e9b9014c8235594fb2413cc7854b1734ee27c733043cc7d064d8a92bc8b4f6b67805d7da65f8
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9F134791-3275-11EF-90CD-4A18CE615B84} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80947f7382c6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425428490" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000002ad57cda5542e38ac0fa68510cfdb2795f088e68b393a713274424fb379c4210000000000e8000000002000020000000b7f7f9bf10e440a29f030f4fd000e6b3a19b29d1b894d82ce22326389740f0b420000000d3234141c941959b5728237cc574ceb22aa66e2366bf214de613f70ff133a4e440000000ee5085f282f889e6eb8367d56a43a302c8298e9e111af050187f2ca36ae3da836c88c6bee76d0234ad280820fac2821b0473e1ce5947b0430c51aa74c92c94bf iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 3064 2080 iexplore.exe 28 PID 2080 wrote to memory of 3064 2080 iexplore.exe 28 PID 2080 wrote to memory of 3064 2080 iexplore.exe 28 PID 2080 wrote to memory of 3064 2080 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0adafcd938c09833a8f8b4b43e34c14b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5587ba765b5cc96dc0f1ba78854992835
SHA1d45c0ac2ab47dd20e5715e43e3ff2d8dbb373a6d
SHA25689e8faff1943415fd557b4df79d61ecd485f626352a4377ef9edfd9422b10517
SHA5128f36ef056c7330c591336f41cd63ef534219b8b98f9c4dd01d233b7085cc27ca02606bd7a11b7e812aedfba944cf66ca942537cc97d179bbb743a0f13a936a91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5003be99afd7bcb687f796ea43ae93ce9
SHA1568f654a7d7b6a527ff49e31e2e65797d950506c
SHA256c70b9f31048aa66d2a60dff9e90ac90600c6ea2c242c685af900becee0044c39
SHA51200a429eb5245057655620ef436afdac68d29637d83218c1fa4f212326985708c2c85bf3fb88d0787b091bff800705d7afd7a0a125f2487d886adc39eecc60b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c744c87baa746e20a71203e76560c8ee
SHA19de0e5fcbdc0b5fc7fae2a97752c29ef87fcd953
SHA256377751d85a008b2aa9232f61790e7841cf02fda3bb3426825ac69e23e487626d
SHA5127e28c22f0f8b260fa7101e6f1ee18b4baf7fb3f1e05bd48ea3b7c95b948f7852b30040e686518d8d359f5f17cc7b812977f6f91438f20e924275cf3ec845d87c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59287732702e16c24bc9cd001658e62d3
SHA150982972cd652062bc3bb8944b24ed0da13d9585
SHA256830413a430299b0d8cde1b8115ab34f474e54f8ce1180e13bac5fd2a0be6395d
SHA512a42b5a657d23edb89a50c35ef5fa7fe719848c49626b6fc3c78b3bf433ee6af796ee86af76da49182cbb68ed644d4930235b9c4b29a5992dee3a964064326da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b831e732f0c2d9d7fb757a4093c2ed0
SHA11cb54b71d8903f1c0ec37895ecace7d79aa8bdd2
SHA2564e76574ec01a1619af681900937174c8dd2a52938f4893dbca43a7f7c37ae7ae
SHA512b23ec13f13cc1102c13dde97132138d4e86c6ee67ddd5771ffbcd94f4840a699a481a2fdd2d162057851db34f904ec2472127f6aa318d6be93800ad881e82fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd22c24a15a408f594fbafb435440418
SHA1b6945979a385a0c70de4f774fd9a4bedcf298091
SHA25605f95bfead8fac6b6133d10b3d6c7aac560fb2ceb4d483ec9c2c8bb673c3bb65
SHA512d2e99ca098d9996b32ed5189285c3bf6ed43929eb09e7c61ab066cfae29b15a399b4a50f3d13285841763d18120764f6eadfcbb2ce8de5df5158cd8ea6b48dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b0e163be68b8f7218af07b5eadfaa5f
SHA14e3a1ab2b0e2069e895d835aa017448f68010a95
SHA256768fbd4b211839b30e0101949d22f2cc827bdef7e9693c26aac17d37534f09a3
SHA512b460295426df4769f00e3581913622bf833aecd58a6e567210581cd23d7439323e446cadc822d396460f758ec90551904175d5ccebaf5edd89da3c5bcc78a52e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a947d8183752fcb16eb6d01d611552b2
SHA12118e6b65a4d3c506fea39c73f366e691f5ece62
SHA25637dc12e1f868deda704d2279206919f507678f6b87a69cf894b96ed2d62243b3
SHA51250b1b8771592f86bf5d622fa0fe50744dbf187f53a7f52517d83ff63c244866f87f6b1eb4cb58ca799a01f5dcb1ae33b9396b3002f5d253dee9bd18681d23c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb38b50b84e1254b04cb619f92afdba3
SHA1736f2a5432467c79dde8caaa881d88f646584f0b
SHA256b1044e145942d0cc96d186d42121132a946a81634648ebf118c67f64854bb810
SHA51260439212cf46e2028ef61124dac7d63c402967fd4f1e782878964620ab52d38aedd177415907574d725153c133ff0aab216244f31d9b5bb97d672b3645c24fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5957cb826ff49ad78840d1f1a9b6e3ff7
SHA1fd9b216ef20fbac249f359788438ed072eb02adb
SHA2566e66c7984708709e75d6d553851eedc95a49045082494aa49c058613eb4e751b
SHA5122ec6854120cb8808051c3265a0bbc08b72f9dd0f89724a53aa74499a8bcf517c7f0de88fde32ee4558cda53171269f54553f0ab001a9dc04db7c76136e51a115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d4a5dbaba686f932badf90931942988
SHA1e7149de6417b21ed03994a674d638779e8963892
SHA256a24bd2493d8781d93662c100c390029a7e5035075d56ecd51f99246ee044853c
SHA512e9c27ebd4ceeb84c0178b53f0d69d27b0cb7026b9c409f6706bf6428b0eb6d7b5ce06ee68f541ed06f480ba096a0d548247977ca642e293df1b9aeba39382529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccaf58e88ea083cca536ec150332393f
SHA103b72327c7ee2924b96e2024da1d24fd00ca3bd3
SHA256b8497edfc01a896169a4c40331927d89191761bf50a85edebda1a884dc0ee04e
SHA512b011d4b0c2d1541dcb25741418f502e970aceffb0ac8a6037fd2b6922cd9afddb918c762921887a4e26abdfa951c7a7bc5f83c327d00a8a079e282be535a379a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b26d42c9a9da538c3b647ab99f3aba
SHA19dd8f4192827d745fbe6c061d731d9ff33bc5235
SHA256dc0a8ebd9ac7106c81f6f069e8dabefa3b973c92b6cff413d2b9a1ed62a5dc07
SHA5120cb827349fd33a32025af721baaa708dc78a160a3aa6259971b315e8d59d197dfbb39151fa4737b8448bd484d9d480650408165bb8297147254be09acd93d6c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589ebd1c81f92fcdacc978a80b86d0abd
SHA1f4e0329d5cbb77340b2b1f1a73a85c41e3f6e038
SHA25625459e9245927fd48b35b9db60a1a53b206983e7417a16c3a61ee5276dc5f8f1
SHA51282711cbcda65ff4c772c44649af68f61831a5f4d8d1226bf304990d8183d9fe49ec4a4e8da11cde10aea0372ce4450f9e8d20fb9f1865a7a1620a36c0f222693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526ecdb2e65042690e9136c2ad7d4f4a8
SHA1d4f715f2a406cee82f8206714dec79ed104b7b14
SHA25648b19c39d0b4cf6a3fcaa7137e3c9633fb5399ada0cc915494b5c70ceee5a51f
SHA512a520bc5db141fcc19de35f9acac20f281e0f18245e6f297f48a47efa902b26a2380312d5e0686b6a2d79b319fcd83bd2b8db2e653e5ce726f4d54663562b69f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edd443f391633a58bd71b0793ca32396
SHA1d80a21b615104a83dbd0ca23ffcf0b756f063ea5
SHA2565ff51629dd0fd99a276046640e68d461d171e72b7240ec3ee1bbcd6e1d1541de
SHA51223c954d655dbc02d70a7186f9daee965e66419783e565ca906545692202132a09082401cbea2109d47e1c029924bfde66d8f0079fa9ce08113528bff7948aa51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c303941b6241cf2dc7b9e9776f2510b
SHA17f854e25f25036ba6bc774421f005fa34d9d6afa
SHA2565a81fb0ae222b88c1910171152ae6f0d804af317d4935a24e69290a5bba6dd81
SHA512441ab988d57a7da4b10d34b4045c45266dc9388511475c4b9333e1a39d890afccc10ef581c95651dc7cd5728a61cc855ec915ae2fcf4753e5f5bd75bdc9cd801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0881f843f75cc62e5520bbb79c23604
SHA193c845ad5a7fc3993e4b4cb91cb592849380a782
SHA2567661334e87460cfc34911337941d0df21245b73195c0bd63269f6cca45ecc4be
SHA512073de4a756fcebf46595e0c3f26b5b1eb132a0ebdda3754b735cdd6adf6514ca505222992bae8aef85c6239f3330105a5d4ddd8f36ddd1b009d278ada842e8c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588932dee25ca833f635340be3020b27a
SHA16bc319e1bd8b557d6b6ed68c47c21c8a95253101
SHA256ebbfea8cbd03f594bc5817c5d284ea77d3388e54a56ff252f8a1404ba892c83d
SHA51287704104bcd43e5810b8b72eb625f78924086ad0c9602c6085de97318497feafe7509943f06391e78875bb0304c29054e0aed6a3e909ab3ddb88f0cc5e422a97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ef356c045dec69698f4b270a9a78b14
SHA1c41451e7395d6181cbfe1f25ae865b6ce6e63d73
SHA25602f4ca8f3324a2805fae8497b2180ceb0f6e66280f18d0e89a9b977bc0df10ed
SHA512fb3b962bf321708035613585e4a163a7172f8eb56195e25c88cdefc3fd718ea7bef374cab19beccd69573a93c930be7748ee266b662f5c327c0b16e72004c524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f08276c57a84a4035f1bfafd7ff4e113
SHA118897871e4e222060aedd44460fe66737fe80a74
SHA2561edfbdade01ea2676cf11c6509f06d79c23e613e0abad08c46e56b1c1aec7148
SHA512847250411f812b13c8b022631b799613416eda3127138960901c4b27a063e2c7549fe18d3df6f97b347cc8fbca893170322f4dbed5a032c4d44d2f9c36b6923b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b