Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 23:04
Static task
static1
Behavioral task
behavioral1
Sample
bf9c922090638dd7b4ba57efdf5c61b7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bf9c922090638dd7b4ba57efdf5c61b7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf9c922090638dd7b4ba57efdf5c61b7_JaffaCakes118.html
-
Size
176KB
-
MD5
bf9c922090638dd7b4ba57efdf5c61b7
-
SHA1
e68202bd6625d750dd3fd73e4cd9bbaf5c19782f
-
SHA256
504f58ee33db605f807488bc9502b9b4385dc1962524759d3b0d86643ee39449
-
SHA512
7a6bbb7ba797a6db96bcd27d6c5c15e0223df9884414c804ed4449e92a6f9e3315dbc668dc1dc7bb828c3ae6b9991b512624557691a0a12afe07afa552b678b3
-
SSDEEP
768:g3Qr1pdFs+XZ/dNbVeAC7LfZG51tmbodvCh5gbd7yKP30+EPZDC4WSvaFDDovaFN:T16I0pG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50a7521d7af6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{481F68B1-626D-11EF-8FC1-C2666C5B6023} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430702566" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000008ef1adf3dad806e68e8938ce38b8b893f838dfc7ef1432c522e575aaa1ce9912000000000e800000000200002000000007175071f70517a84aaee1c3940832f4ceb9e34df00f4e3d6cdcad96dfed6f5a200000004cf7151376f61f09d7d961b9f29dc4c07f1a80a065eef9d54088de394fe33a43400000006201673781a2175a230774572f8c4458c1d9e2649937071de0403424283941aa91745f17123bb3d944d579aa98f19e365bb00322d6edf75ce0ac64cf21b7f216 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 iexplore.exe 2868 iexplore.exe 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2588 2868 iexplore.exe 30 PID 2868 wrote to memory of 2588 2868 iexplore.exe 30 PID 2868 wrote to memory of 2588 2868 iexplore.exe 30 PID 2868 wrote to memory of 2588 2868 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf9c922090638dd7b4ba57efdf5c61b7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5103a11e9556df01aafefdcce31c1f042
SHA12c472ffb588f4711eb5b262ea4d0feef6eadb91a
SHA25656bd44c84b8e7e634fccfe61bc7f61fd0642bd6b2d2bdf5dc569969fd1ad12cb
SHA5129dbb5945a5a8c0c12e0dfaa4a02577c767696a829d59d935784fc7dc40847699b9f3454575c4931d92e43097c004eea4bdf465eb674aafb5aec34ccce0f673cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD535ce6396b78f06029b5df11add6bb3c8
SHA10883f32593c4b95af7ae9f44c747b1199978fdba
SHA2561afb9914da51c226bc5268eb2635834542b2d5665733d0641f5e1d6645afbbee
SHA51249d2791b2666de473b3084b1a0807be1c4be26ea60fd1937170d728b75c7a49f933ebcf87b7e2c3f00e80b539ca3e4b6fc6d858c78548363c19a7408ab958095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD526b9715ec1965101dcd0fd3647c65fc3
SHA1b2ebcd972038cbd23cc696598c64f2ecb7d82761
SHA25664fdeb5071a04b3bde7e0ff636f91ccb1925cbecfe4b3585661ee0aef120d58e
SHA51236c94634991a617580150aec5b6ea925ec7fa797930eadf5646fae1b40e60610e30081a642a7d1a9d39c16d91586d35830ec2819eceff0fcd0b04b1f6b5b4a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5339f82ae1e979c56253ecbcc608e287e
SHA166850f8f63919e0a35f3163fab4f97445bb7f1d1
SHA256ff9be91aec7f8cf12cd8bb67e8ccaccf03ef47610140480b1c2818be34645171
SHA512a767a0301088f2e171460a946bee3021adcb2890a62d280628ae07b71786747922a4f8b55e5cd155934e436c98e855ce8be0e4cba966d0bd3fd4f580d2a3c534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f0cd0787068203adca0f83a57ad529c6
SHA1ce26c9261e9243b92e5757dfa9ee564f2e1d59a5
SHA2560e787446f38cf5b8f71e844b5c90146e3c6b66b35012d4e42f6be6382b8ae03b
SHA51282baad0c9406d147b200f14482573f7c7f9499215c730b24ff67e61ad969b0c99bd2283d9c00d9df6379bfeb3c7575596372fadb4746d97a43fb0824986bf7a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b1a707ef6a89b57515e7bd8b1888d912
SHA1b83a6b8cae9a2c7f577f31dd65512d409c9d1b75
SHA2569c6aca9d8e6b9481292b7b486b169de3a724e986813dd54a5ab9416d2ed9b544
SHA5127327bdaf93c9f1dc8a6ffbbc05e9df5794ace141266632e54691c981e46ed55cc85147e51978980f717a9d187c5adc4802e6c81c10ca7abc7e9fc363169f44e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56afd73f61c9893d3dc993a4c5976e8e7
SHA181ec09ee36b58fdfa0ca791a91224f5418d766fb
SHA2564bf735cb64f23cf1193d2e531a6c2061391795104a7dafd2bdeeb6e4c3657f48
SHA512aacac9370a3c88223fa930c6c6e9386918382c067b11d023641222ab117fb3dff9eab10ff76dfdb736f2f338da4488e3b6072773e3eb6ceb16fcd925658f6005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5907b22196a5c1f49e4aa031749803a04
SHA128221187fda7587276d17c454b911a9725b1ce42
SHA256ee7bea0083f6cb593480d74e233460adab79c96b9afc75a38d5570e3e38e65a6
SHA512de536d02340d86d50d2fd5e62574b414c5ee01f1c776c138444c2489d127ffc53d8d8958f0296694f9502704f398f7838ab82ba83e0aabeebe49f5e97b875349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57c8e1265bcb9b97e3bc978d418af2062
SHA1a0f6772c3c11afb99dc25591a253599baf9b6a42
SHA25621e3dcb678cc72b8a1aa557ac8a8a8be9a92fcf50fc9f3932abf42da34e002e4
SHA5124e2c1ab3be5234aa7dc5b85bd291479799567e0f31ee11930475285623dc745a992d5a51caa1cded928be026417233c830c2a0e6ec2fb8a6b3cc2b026a731e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD528fb2728ebb48bd7af021e25f1e4173e
SHA1227dc8e472f3a383ff1852110ac9ddeb7ea474b0
SHA256dbbc45bd2989c27ba4f44cbeb61c5f79a96a4ede3703d95977d85a2e08212b9a
SHA512ad7a613cfd46ec9ab4713e2239a7db20da76f7facb9a8e59bf984a114761c0b3e6520f47691e9fbaa1939666ad16681a31577f5ba53d0a38597346aa97eaeac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59399225bfabf16f1a399b46b2f45a6f9
SHA1c3e171948cd764c4b3405497ba30f75e8dfb9f4a
SHA256ad9a1c9512f872cfc3c31e30a1fc0a7cc69933a23855c4db169895e8d4040cd4
SHA5128ae36fce92544f6cf700d4f76540782de4949165c17faa45a9e60c0e81cb06404a5638211188a2119c878457fe5acfad4e18a9ad18ef05b38b1da776d672d4b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f834c727f5240b9324722df835a1f89a
SHA129196f52938f4c6d447062e3458b58780fd99573
SHA2563690c34e42f32cc1ea2747f0e74322486c6fd59063bfeb95c639c1c2694f36bb
SHA512170912d8f7422a343eeb4ccde1ea4407c9dea07fdb3631224458351ef368374f4c48cf68e245e5f4a11b8e11ddad629f103d16e06764adf1318e7a2ac0992e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d3fb2e0a61dbd4c1eaf5bc8946daf023
SHA1737d0e5d3257f10036b5601ae749f65b3ddc4702
SHA25650a68d03140deacdbdef1fec6a6a577bca54764f15347057e56019b522f04c21
SHA512cd310b72e69b77aae274a20a27c945a3507b1a85ace22ea496a1f64b346bf81b12e940520264ff05903c160a933dae258c3b8b29ecabb723f7899a5914e1b01b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD530b22482acc9045f458163d394fdc50a
SHA18ae2fb76e73de63099187abea8c29049b32fe733
SHA25605d6e1b478094481c601ea0c25746a1008132852f56a169e9b02db2b83722266
SHA512c0ceeaaed972a379fb5caab764333a43496a1404ba1e996a6e733e95be712c5736306105fb5d8eeffe423fdec26e485f76d0234d18882ed5ea63c2cb3c132614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5312fe5208ccd0b197fb06bbde57ee099
SHA12b745eef6e709a00119ae2e267523a32a234ca80
SHA256d28b91fc3f27a0ce3020068c8307dd0d7588dbea05f8b45fd5aecea070fe894f
SHA5126eacbb166711895292ac3f41cb47667ea5cbbf4516f56b36a0de207217fc506623805a53d5ad26ad1345a47c0400a05cfa76656aba5936034789c6e1499af822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56fe25a59ac5516d649ba2c64a89efd87
SHA1dfe2c0c20a06405fe65cbacc490baefa5aeed823
SHA25670566c611227ff90069e1427a235ab470fb2dfb3dfd591fa67a382033617f612
SHA512078a9eb1793caac8e9c9bfc2728af1af282e352ed78f872a25e1904ef3ed9e20ec90df304709bcaa15f1242034dd0fc6e34a4c80edc0e26a50706f73a970957f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a9fb1caec08f33c55cf862b53075b283
SHA131858595ff2163f0014e93a4b4e4f00958aa297c
SHA2560d2a34aed8dec0bb958cb9a7efa03d96004d2227e46b6c1c90440424137d2e45
SHA5124ce9d42b0bf13cf7d1b30b3726605f9c2f81d2dcd8bfba0d0fb14c39da144ddfd3939dea76938e880bd678b25e4015e1bb8371ced49ac46370b16606047c41c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e2d8f6001abd0becdce5480cdd600380
SHA17ea199fe112b77fc668843d456202e0220ea37e7
SHA256518769eaa39433ee52509f74fb107ea9edc24665ef5883be4c7ebd491493b104
SHA512260861771c669dbb22413bdae63bfd8f66a3555ecbe8ee26438495e44c68a75241ded9a038cb4da72adde63f5f4ba859cc828a6d6d9e13a7e5294dc7bb37ab4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5811e923029ab51ed059219a891bf34fe
SHA1ec67fed681d7fdd19a0cf0fa3f7475e266d48360
SHA256d9a454c8c426159f3cb7bf2bf29a94377e0fcf306b770520a2fc41a387e450dc
SHA512c110346351361d29f320ede1efb3bfe383aeb297e07ab6baf75009daba53a88f238ba7903662928c77b10ce6fa59cdbc39b497d8db374dc01c25515eb9043b6f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b