Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 21:49
Static task
static1
Behavioral task
behavioral1
Sample
5dce6c72f06eb446236a0ee980a2a3ed_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5dce6c72f06eb446236a0ee980a2a3ed_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5dce6c72f06eb446236a0ee980a2a3ed_JaffaCakes118.html
-
Size
22KB
-
MD5
5dce6c72f06eb446236a0ee980a2a3ed
-
SHA1
30241e76ebc64eed2b91bc5fb768fbef234a3eb7
-
SHA256
b2980ddebf5a0dcf628712c1b6ee5992c16e58bb5620867fde96fd9a86049234
-
SHA512
fe854229678d79c4f790b6d4683857b28e3bc0562c1355e966a1cd2e92359d56c7b0778a560aa5bb3c6ce20b06e1cbbbef6716fc955ee5589ce485d0b62e1628
-
SSDEEP
384:b3kkEgEEDDLNxgosEEzDxcGWylhdPKhEoxhaouauXZv7nxIj425KPcaCyvx8D1Gq:QCg71zvIqXjILyts6kTvDjtwcynCkeEI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303728ad25dada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427587664" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000f0932680836e866d9a18ee90863c7977c2a8af3c0af075023430bd5f804bb06e000000000e8000000002000020000000f1a694173978e95903d0c12971b60be752d8bd6d3847384b1c2416fd92473a882000000011fa915ce25cb27082c33859c5280f055c4390274ff4fce25252482644d43b9f400000007fdbcfc7c2fd697c19ac995abb0cfef855fd80672f1f900de6f65457cc28f44f2c44066117c829947ab440ede75610e6f5cfa4b179e80e23d28ba20bfce27c94 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D717A851-4618-11EF-AA78-6205450442D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2028 iexplore.exe 2028 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2340 2028 iexplore.exe 30 PID 2028 wrote to memory of 2340 2028 iexplore.exe 30 PID 2028 wrote to memory of 2340 2028 iexplore.exe 30 PID 2028 wrote to memory of 2340 2028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5dce6c72f06eb446236a0ee980a2a3ed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512083db00a2035f52d5a2514e0eba1a3
SHA1679f27941ccf6cb84e547d24db8af0915d7d155b
SHA256ab6c7de755e0e732ab223419a451ac2b23ea49ca68363f13e4b8068b32700692
SHA5126cc25863ae647ea28af01644410a5d2c4096447211ea68e453f82e745d4696cbf39c88a17c940c39bcd228d17270769ff647453d291f4d52513864d9a27451d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e57099fab8515679397e79f15c698daa
SHA103803dde3553761d7ca0e85029eac86adead5136
SHA2563b44f06149e1a4162319d84d434684a0985f707211c99b77774b214013d4cd60
SHA512abdaea2b5435ec805fad64b8a5b54247521507633a04c2446c10f9f677fc601b11db84f864d2a2c528af0b58ef38d854f776ffd5ddebf78b7e815364d50db4bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7729bba4c5cf480ae7c49e115084da2
SHA18f1cea90eba7c44f6cb5f134476136c52d9f6a8f
SHA256a1fbcbe427922af02b89fd6a3b33e548702495d450751c9b41820ef4fc7fc4b3
SHA512dc97cd112d70bf51492d571df4c6eaa23e52a1741feb5a9b45289a412a79be71f79bffb911486a797d9043ad4151a5b11cdc42253458eee57ccbf23a5c5180e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568305fa4e2f0ad5182f9ea5f86d45097
SHA1e436b9cc9b84066cd72735bb3500609a41299e72
SHA256a54e9d3d9a696a3706448fc6e48d0e1c782727e407ff984e71af0b73dd4f27cf
SHA512a3985c10a2ae05a52cfa1c90404242375914a6d7e1ffb8f4606614dd464db0ac47624edec02b3d6874f4738d72a6b154fa2c0fd6ea49b6c18fe1c06ae7f92f2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c1bc66db163828204d8b4a4335e0e6
SHA16eadea317bc1eb14337fb9e93a774f63a430bc34
SHA256e60e3f0a1698340591afa878a4e921044b493e250458e459b6e88191e91a8cda
SHA5123733548bc2e00ed2aaf147cd2418be35daca16f7a8d359f34814f3a40a85097cf42abe838dec6ac090739a2a60c84f16d8a9e66379c56161630249701eeb8748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a528f16c53066d4a7bf39ee19d7aa3e
SHA17687631d6ca2f70e07315a2387d8fdf0bb31f5e2
SHA256d4dfa56006a13abedbd80fe8e0060954d285f4de2a3e8452ab70c5c94d51a9e4
SHA51250bda9b7eca1812302fd8a1589b7fa0f7cded75d6bf06bdbbbccc4e0c7ac4560043b8e20f58fe934904809610e645dcdd163299bfe242e06e8849fbed40c6a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ce75456562cdbfde6cffa7afaaca9e
SHA1c64a0ff6f425177bb53885d1f8f1d4b4cbce8336
SHA2561e7c5e8ec640bd0342dfaa6442761f04b4d65c4960e716daacff831cce6599dc
SHA512c45439fedf91e32a31bad935117c00c64c1589e5bb8a37ade522ac8bc42b7d23b5124fb85ffb96c918bf8b82fef3a71afa6a49ff70aebea6410550c492dd8ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0569ea7f986f2d2aaaa0f7bdf53306c
SHA1a056dd91bbcbba911dd5b394f4d61d26f8fc09cb
SHA256faed5928efd0baeea075156ae6b583b7ef518531889a9f213d505283916c9132
SHA512d9c0f1baba42a774ba3bd8387038b1f53398423de143cfd694f90fa5fd14fa7e2da8c5b4ab43c093cf03cb3edc712bd25453352d9cb83b50ea0a7b8c95d4b598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561649ed26e352c7d2b62faac583ca06e
SHA1bb5dcdb4c12ccd335ea3e6d7d74068d1fb74f9e7
SHA256b4d36f51db34742bf44bd119efe5cb721d082fd8d142c8036c542a128ec814f9
SHA512d93420c7d7f5edb5b588c2b907dd07a088cd9dc6673d7faf2880a9a56812060358562471488dc0eca1a7c2dec8b22661d4ff8a3cf63f9c1b1cd62f2a185d038e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56efd39cb5afad586b8c7c8b313406903
SHA1833e9186962c7e19d13a85056a7d3c618fe0e09f
SHA256ea72768f86d420be776c741c9ac1b1772fa132c017ae01fef5e07eaa25e91c17
SHA51261e333a874bfc5c17654a96662a94a6e7ca6c646f1b3fb71d6f38f8e6baf421853e7aad3df448ae561ef27fadce4b506651aad9e5b13db25a4f295abb6af18d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2b618e0d1ca9dfd4c433382dd295839
SHA18a1ee3292e18e053d73ee03af64a955ed2791111
SHA2567bd8efc73ad223a47dfcd997eb40614e36f698b0bc97f57ca5388a49c29dedd3
SHA512a6a6bee590a324d1427de8944a123f0ab0ce7a854b4a32d0824c522919a6aa11a0941523d2101b26c79cb6bef4a23e5bf1ec779891b9467cad392a880f85a11a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507176b31abe59e6e0c9d04d28aa1eee8
SHA1cecb5e53083e7ca5c044abbf52e0e7cf337dfc7b
SHA25609f49cb49066e232ca2684dac9dbf1e818d623a176aa388e173019978612b9c4
SHA5127bccacded17f8a4f5f36050b9160e50cb5c9864c2a917e5ad938e30f1db5a911f2e8f745e653f4da656c6879b8a74386f839669da1bc5311c1cc529b8c1e6bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54689d75d0a21bc0f099d4f09c6201f91
SHA1b1fb9d5119a8b24661ddb69c18ce5c695f1fce4f
SHA256a741b71fd07e5699683a3296153ccb6f2da5b7fa94b5183f1623985a2d4b91a7
SHA5125a02a1ff8190c6ae81f0712d0b25ff3ee1eb8924736d3c8cd75e9e03c1458b81a58a64d45f5f6dab1dafad032e0d77823d844f24c92f00cd2d6872ee5c790344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568dcca19758fe4a30671838175ae1366
SHA176748b6256568d860c093cc94926c24a429a3b2f
SHA25648d09073a330f9a788b586e3a885f13e534a82288700847ce34a25f8cac1156b
SHA512d7b015dd8ce232e6a4c2e7f5bee2a6860e812e13c74978673d086767711b7bf3ce91ff417a4aafee4ac212ec7d3f98595fc72d1dc677305367229dc0717f418e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f711a7ceffa636090c48d33c38c64ed0
SHA1e994df963764260ddf730a2d3a6a80041711bf75
SHA2562bbe1b17afa596a75655efe1330cb43d7db64f50b8678cba912eb3b7e873e2a7
SHA5124557b384f8d2493c2d4cf763c739acce2f9d053364edbe63c5fbb5083adad508d47bdad207dafc983264c1fb920f3842607b144aabe52bbe82f999a95795784d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a843632db6a49efa5a76a9c8c52957f0
SHA1a0a36c85135fdb0457e553d3e8b68683d88d978b
SHA256adf8b749ef92a4914f1f8e95f193eb687ddf823b47b608f1f283ffcea3a4a25f
SHA512b2260667664def784c89333b9c1749374239aa08860ea86294220a5ea656de47d371acd95126eea872985863eb9e8f57bc6b97524fe031cfbe35d701b48f2635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a76b567be88a39b8c1c89fd60ef2a65d
SHA159e8d3fb5f378b29657a793ff6aa649c2f240e17
SHA2565cd924693837871b7233ca08720c98b35bbadf3efb120916cf16d47cd024142c
SHA5127d23201ddfa2a921c4d8ebd2145e560bfce03d6a1b3248e36b64995892e9acfa66041b1082070ed5bac7455fa8eccbd8f89ed0e5f9e7470fb7d0e32d16b94822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9a4a5041d8d31edbe23e1d6655dc8f1
SHA1cd5629fafdf4e3db9526d45e450e607f54454080
SHA25677a803eaa4f1196efce2dddb74888893a87fcb6018fbcd6fecc0790ec317ecbc
SHA5128d293eb798622d8e6ec8aafb5670ced5401dccc8a26bf7b282bd45d275ac61d86328dccea628aae25ee6d7930dd3ce04c625763dcd3c7b2e36533e8f66f0f00b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0e7bda5b4b061d6c4242f0ab31503c3
SHA1c93cd2628dedce321bc6d216a70a4603e2c406d4
SHA2567c85e7fc5243bec0254f33f7fee53c8c5294185e1eee328037b091d42ed12669
SHA512e0cfb02c669934d8d6b02b0d2d2d8c0ad8ac62096d095d371a26920a6eb8398f0f29419637323339f2a0c1ba537de0eb6e91befcbadca73aa9703b7e7fac7f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c503dfd8c4f52f0254ef68651458ae59
SHA11127631337565ab7dc2321f03cb5ccff57895213
SHA2564322b2f8b41a9ac35957d57d710679005ee50f94e355d573ecedeb0a03b22102
SHA5122f7c454c92a8ee2b0d576e0ddfe4e763a5e659aa7262a281fb5f20067e261643b543aebd32830427c1ef0a76ebebecbb5e55ab004f5e2f40c1384b4433a13e09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e07575bef4a24b868850a5dd7e1ce3da
SHA1ded27945440736a700641f852328e9205b59f6fc
SHA256bd3055c36cf2ef39cd8cce7ebe707faa6bd254f4067983ddc070e17f2245fcd1
SHA512a516ffa610ce5d3f7a8f7ffbef24e466c54bd3f9b18f117032d5e437e108a230efd0d16f8c662bdca29440846390d1f8894ba7393bc2ee6f72c232131de79a4c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b