Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 13:12
Static task
static1
Behavioral task
behavioral1
Sample
bea981ebb6eeb426122fabcd03daceb6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bea981ebb6eeb426122fabcd03daceb6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bea981ebb6eeb426122fabcd03daceb6_JaffaCakes118.html
-
Size
90KB
-
MD5
bea981ebb6eeb426122fabcd03daceb6
-
SHA1
26bf32ea2b5a9ef2624e5d072e962f432685add9
-
SHA256
96ea51608e9ff90281ef5182ff47a76b3440e652d0cc5538f7ea5b9bd5039408
-
SHA512
bd2ce60958de273d8b0f5b4554e4cb669a4c17a0b3b03770456090105b47e33ecdce7c5adb249fe100b19a4f25bd0424880979b3d28a42c0c0192c94a1671adc
-
SSDEEP
1536:HPq21NfVoc/pwinRyBSHuxRGmXXpMd1B2:Qc/e+RyBSwJXZMt2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9197C081-621A-11EF-AD9E-EE33E2B06AA8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000009b2f3150544d6f3318a8a2f8e1877b8ea0b54b844c31bfd5c190773874a5fa70000000000e8000000002000020000000dd61dd99afdfc8787c8d7296a0624cc90e123666da1f830d010d27cf723dd99f20000000301551da37e8b5f4bcc5b1196b09e3eb50a3de3f15bed46d9c0a1992594d5ec24000000058993820bb38ba66a961403cc1d52c27c6525c618252bcb1b0f1bfd830625e7bbd566e71b080f91be03b0fc96e1ee96791768c8e048b66be3c3c04c1cf669e74 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430667039" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000009413fce8e5199b7331ab3afac0c0da85d54b8790d8116dee5cacc6dd5b73e732000000000e800000000200002000000011e58b35039bcaf562b14d77bc9702d075ccb3e4915eeb79619bffbdb6da78d090000000c8ad2946423366121e0ad2da45c05281aefbe35dbfdb35d24ad30f5c8b34de43086ee322ce2581a81d2b40876c17de426fbbe1204d71518374740e04f64c8c1005de832736d2b76a4aef814bab4e95c7a52fb88480827fe4571f73f435b1142dd80cc23c58fb0473b3b773691c96c5fcd39dc9851197277fb83be6336baab967cedd087d243d11d2279dba6fd5ee2fb24000000039b34b1bc1fe9fd7a9cd4d1546e371795427630c1b53e20991f0e7d627b4e468cbd5eaba64e656945026ac5f3f3fe7025b53bdaf88248e52f98eee31261a3805 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b92b6627f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2928 2272 iexplore.exe 30 PID 2272 wrote to memory of 2928 2272 iexplore.exe 30 PID 2272 wrote to memory of 2928 2272 iexplore.exe 30 PID 2272 wrote to memory of 2928 2272 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bea981ebb6eeb426122fabcd03daceb6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fecce6220f5d45d9a75b3ee3d103bcd1
SHA1aede37e8b486dc99686bdd0c09c74d517ec98706
SHA256d9ef58f2cda940a4caa014f43765193f241c28a9844162b4dc1b012dc8faac36
SHA5122f3d7171a64c5066b85941ddb02e528939abbd400fcec7f2a779cb4f995380971788e63802684b547009cf23b6e9c37e6759cac09017e97a3f0c0bfdde4bd399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5889435481be23236ede76da02701559a
SHA120e521cc9886d1a9a6f16a24053f401cc990b59c
SHA2567d6267be02d0bab1582c9c3ddbc57096333d0824fe79df93bebc996848cedb2c
SHA512102cae86bdc8f5c7ae613d68d4e075386fb1a47dba93f0b519ad10803fecd4bef69c5cc358ad7ddc67b62199b31adc081499130c062a99ddd235c1f8fa91e470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522d4f63b280000132ff06098590c3e91
SHA1a3470a232141739cd288238f45d79962f403b397
SHA256943c59f355530f2ec2c97cefadcd9f5a4c41501c8c257a996d89cbe5a80ea1c0
SHA512a9730249b959124e114defa370d97284350de9a1efa3ea07d6f6f4d44f8663820b3a4af3e9059f9fab5f15f51a029cf708752e3d2e76b1db0ab665176608cbce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5119800babd04a7846f49f152d2849c38
SHA1ad31109c3f1f3e664a2ecb649316f82c98c48fc8
SHA25662673bc652f5b6d3f54d974bb0a2793b5de72a770c934080a42ba1196243b740
SHA512ffaf5088c2c47e67397907e463703a2cf3e17852c7f3cbb298830408a5246ca03c13b3dd87deefa13bed24ba9eaacdc2ca56d333bafb43c02a9b440d2b50617f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5387b642985bf50ded8faaff140d4ec4a
SHA1ee46129fa5b849bc00695309fe6010b391c225a6
SHA25610a41f3202101c49bada1417c5aed6fa737fea1cf57ddbfd2cea4697233dedca
SHA51247cf37b202725ed4e666a65f886af0785d41e85cce1b18bc8df9c5acde0c296478899f2a88e9bd66b293ff7f13501b44e9e8fa06d76ab25fe686303eaacfb64e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb8b87c70aa2bf2dd37488bed6777553
SHA14d07c879ce5e7d9a7b14ddc680f94f83270ae01d
SHA2561d54c6a485d4a37af1228df7dab958fc5b54492b5dde0a5a6fdd76fa379d0f0e
SHA512ae927730125ced3d6c4d3b7c66d3ea4e2d43f339878454f30aa149177fa8fd5378ffa5fb6f5c82cac0aacd4dd9da0e4f078e5aabf5bdf153e426755c9f993382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e8b29eb92aa8492baada956fddeed6b
SHA1c0089204a643d2439335affb7de8f87bbd7b4448
SHA256d29183af1534e07d86f79739a10778101c5ff0c104aecc8480d4b499699d0fa1
SHA512300340cd2770f877a59412686aa67d2683c13c939776018e0229823482a8beab1248156828c6c04272286fdeb77ccb2c97a747cc660eead9c966eda8ce9978f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5651439b22a327281f593617e9afdf521
SHA1373e9137a90f7671de702aa91a3e6a9f29e5d75b
SHA2569d463974dc068ea4d586519ef269dd51ecbe165128fa096b61698b2758c2732d
SHA5121a4f3b678fb1d3e3ca808fd474c0be2e8a4bacbe93f77cf5156c5e21b97f6035c687d3dde9de6c0f98fa526c5548d0ae60c11d3d69410d1da679aaa40c097724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590dc05b1447bfee38e7ba8faa7fddc06
SHA1c88dfab8c2e00f6e0529db4a2aa68b504dc5e236
SHA25610d3e4ed81bac7dc3a519c2bd4afe49444cdfdd0504c8717fe690ad1b889df08
SHA5129752ec8681c9cf5d060e711822884fefb7dfd698d675783eabcde63cd05494e1c6848e4ae12aff8f6d6b19e512725cf4c19af7bbdbc1c51d8ab1cd7934b56da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cddae38ea429189e134090d653c6395
SHA18b0432b912a6c89fa9fb8bff03671696650d99cc
SHA25695ba4598b22e84c7aca9970e8e6efa049a5fbd6bca0d991952dea152e4999105
SHA512e35198900c7d76611bb9d955f1e605e6107cc23a5533379409f213f3c4300b74f604e1d6c6127db1d057f4bd48e8c53d7025a5922110c0c75e05a8b17f9083be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563ec9656a19b74e18c1d492ffeefdc1a
SHA10d69ac57a8461fbb6f0da46448ca479c746a7632
SHA256d2d76c285189f8a1ee24c4a9b8eea6c4251a336fdf4fa2c00ffd83d780d473cd
SHA512725b2fc33cfddc27659f936648a21bad7f3d77edf21ebd34098f63a67119b6bf4cc949e15085ccf17856d23ad0a528c1ac43eb75d2d65721a28b2007e9e8748b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a197a024cce54c2731cc7e8dc5de51c5
SHA1bf3b44fd28789b0b346455e27a755c3609397229
SHA2569b29c9ccf728454caa68cad5aa1600f8161bbb871803101acae50bd15cb6ec81
SHA512aea3f639f3548d12a51464069012788ca34442cb0a7b2e5dd395587003506625d0c124c329afcfa6df604f399609be6140b1f5d709cc205929e4ab94c4e4f925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51de7737070ce1bbcfc5b5e0a088e980c
SHA1f5d9789f4677f1d1ded580c584f45cca0f0ad731
SHA2565097b0913ff714d8fa6731d0f0b1f35e074a3f283849d613d2408f56a30ad24d
SHA512a6c469244ddac6a886b8a2ed16d40870b6ef33cd3028bb3f3776c9c6d6c4a0e5771aec93eb2d9db0c14d1d40b7a23a31d93fde4a903c40d0bff8e7a1918fb6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a46b4c361702f03a4e7189b8194f5a2
SHA169b9ea3bbcfcd70db5014caff4ee1ea9b8a0281d
SHA256efb9769e78086c24f3cf6fa9256f82dc76c897f5ecf18a5a8c8a0e015a3e2c76
SHA512a549832e331cff80613be0e025c60d454a90bf697d5da6a03f994b23cb9e9054b8ee9f580740e13626960b5d7d413b0eb09954d08e15cc50bd9623548e902faa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500458a2c3544fd3015c6956ca4a90e06
SHA1a93889e8280b1830a0ea2fb53e656b069d9f3b8e
SHA2567cae1d41e71b5aa2dc073fd0d5512530bc957ca6760b96d62db46be12515e763
SHA5121ae36725a50543d7d2a65a1ccec704c96fe7d38ba4a8e1dd7c42d082e3c0508d016ae7362a364effa348337a3bbcfff7d115b458b83d208c519ab89846c853a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3661749135a98f93e97740ee10f3c8f
SHA12ffef09b9cb7eb27e84503319562cf2b47f34425
SHA25635f5b46f6dd3152f981c1330ce34c7706b52c907a71b6b8099b3787c80af4b0c
SHA5129092510dd374db04340e34be8dd97eb2f2474359cdd7c9ed9b5a5a48a771ee15c2823408a9147d82c1672ff70e10eca2d26c9096a570933b768dee06a82388b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55235e86a586597cc73048c4981c0e4dd
SHA1f367a36d15b9ab35371140bd2ed13219f9404346
SHA256e1d558de9ad600374da09bdb709ebba07710db901ce6538bc549314b466d8e82
SHA512fe9d91b3b5f6e252a18f3aa5aa0f5f7e82bcbc64e3ec4a6f94f9022e0a9d951e86155a606b5df20890003bd860fb08790d8bc2b4097f94271a4d1cd028914e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82434dad9133903fa5b691ffa94a66a
SHA11e41784e8240808056b38555f7d2e6e511759c92
SHA256e52421b4e7b8c1dc0721a09c252b25a9a4e4be91f7c8e2e2c0a721494e72afdf
SHA51215c75791b2a851fd1e773f9adf64174e10d0755821e6a16fe01b4bcacb4deb85915946665d83fe73c34eb49eb3b220edd5096648a37228bf25c9fdc22439a332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b067231b58555addf17cd15ff4602c0
SHA1ea4ce8fc3020f09628f2e0d11e5fccf9ee11c384
SHA256188557d82ac0e8bc621e9be7ac49fe6478c8bf7ecbfb62929a6a5c8858c30a6f
SHA5125d8ec4610aae26fe8e273077aab767fb0cea66c5b12851fd40635653d7917f3f0ccd9e51bb6aaa0387c1909fa6a64820715b52bbd86277576dc46a185e0641f7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b