Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 04:58
Static task
static1
Behavioral task
behavioral1
Sample
ceb69343c10aa1f10ced043ac92a2c51_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ceb69343c10aa1f10ced043ac92a2c51_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ceb69343c10aa1f10ced043ac92a2c51_JaffaCakes118.html
-
Size
3KB
-
MD5
ceb69343c10aa1f10ced043ac92a2c51
-
SHA1
24a1a915c6f5328efb6b6931ea349e6a3d71adf4
-
SHA256
2450ad5984a3a36bf0fd88093a53311c95f2cbb69ab1c50b22d9136341dddd33
-
SHA512
88c3ec7d2ec13f4b2bc2234147b723582568f50b5d4e222db68620d15920c9f16fdd5da06f99348fc25037188bf41c96abe8262c2d91f80420bc9767a9f3c150
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905689711900db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000bd9c7b94ec47cf3265db8f09cdcdfe40f7d8c8da5b06ea1c7ae55c651615e84d000000000e8000000002000020000000a91187fcd0df3aa3aaa9d9b02b01e14ded50b244c384629e84268015fb65396a2000000026ba3981010e03984ec03a796a16bddb97069d16384df6b0ec95b3a1d2ff4d2e40000000767ded0f260a9c597d7dae4f6fd647704c1bbdb4f3995d281ec78640ba049688ed413d12946b5b786e7e1e0daad5b26242c5dc2f917bb366e159ae1f963c86f7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000000bc07b716545fc2521d0ce97186604807d15eccbbc8934bec76c62c34983740c000000000e80000000020000200000002f0e1060398170e2ee40c09903090c8f8c9466b0fce421c3182f69bb9492f1b1900000009717536e015ccf6ad8dcd61c326627a6313a1466a22c4558a5404973353a7ce5ce58d2f68e462fa1951ae56b695f3aa6a9cb34ec934d9fab570b4bd681a15d894120d5ae3e5cec18492e83cfe82ef422dee98a0258e52fd4962ea8fe3e8b3966eee86dafa7d0eb59065311b34ef1a56aa695e38fea939521f72548289af19bafa94ff1b7edd3cf42cca025b9b853a3d8400000005c4d28e0c726259fc343ffb835e137bc5d8c46a141b15283ca32364ec776702eeb4b8a2ae2588eb5ff0d56c5234e0549a8e935cc37fff10ff826f87642cfca22 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B4E5C51-6C0C-11EF-A6EB-D60C98DC526F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431760554" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 316 iexplore.exe 316 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 316 wrote to memory of 2356 316 iexplore.exe 30 PID 316 wrote to memory of 2356 316 iexplore.exe 30 PID 316 wrote to memory of 2356 316 iexplore.exe 30 PID 316 wrote to memory of 2356 316 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ceb69343c10aa1f10ced043ac92a2c51_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e5bdd471e60b626bd4e5ec3102d2f5d
SHA1a1c7ade2aa4313a742cf7bc62e7c51c1030f65e1
SHA256b1c3811b161c97b8769be886b4cf1e57083ae6116e581eeabc035e6502771394
SHA512513ca1b6ad708cbd9d15f8193f008d51a9a9d61b95e83ba06f0a6e62c46e2d34e73ddce66e4c22b9a3d9d2520474dd51d2838a8bd45e9bf3620bd5c7775739f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0fefbc8e27797d970c8f983eabc9d9f
SHA16d5cdcb3549be888c2e80b0e9dcb7f4fecbe5057
SHA2564f2282cec0eafbe8b74c93f650ed9778596fd9f4afc13d5e468d4d2c57c8f773
SHA5124cbb903eaac042913e168a89611683acd74dba6f03d679ae2b34b6269600653cb1d2ea7c9f6adb500e5c66b4f8251e1d66b6e36b26ee7dffd96f815cf6065f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e52f344b50b76b450ef82dc2c861e4a4
SHA1283ff28a60d5ccfbde2a2a25a867d39233a397c9
SHA256d18fccb7a91e9294e161b1d7c9c36772377e752d980222d43dae67b673370441
SHA512eded218c1d342c173fe6ccd076f6c6421ae6d5462607d9211c1197ab7ca35f85722a841ec128e177c8907a5109c787b1f75716401c3569412c50c883739bf7d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5975e3c382851b8e9dd27cca02d126919
SHA1e6eea48629e204656e63a7c5e0ed7aba63e3b50f
SHA2564c8e051602f9bf2f5fc01b896856acd55319fcca0ff4622fcf6af996c8548080
SHA512c70eef4b9dda7aadd305611149f0777f4e6af998d1b172bd0ae698d5f405590229f56a6b36623c04830dc0ac7fdef8c00495cef4b70d979c0bd2821d9d39afa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564b999b58f53ac30cf19018be14d016d
SHA103a06d71135908d0670c9f6d1ef62f9b5cab14fe
SHA256d25950e61dbb06de6346c2d25f2742533e3db995a41c2616a7c8832608edcaa3
SHA51291fcd9728b71e1c24626ab05e4faccc78d3d8fe09c85ca7d77456f9092f90a70b0bcadd6d6c19441002dbf50f9cbb2780ceb2b9260bc1afc5eb638664ad0fd0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f22e954d250bdfa3348c3d96706ff5fb
SHA1b8e45de72f26886cc3c9fbacd9aee3d53e68a585
SHA256668af52ce3b5ed5c649d693af6e5c59d2dcb23422f8163995a4b023d02cb2178
SHA512b572f396fb9fe8fe1086aeb674e0cbb578b0aa47a3da8ba9d3aa8262481e250b96b4fdfa64f939ac3d519db8a87994cffa1b64fb9990bc1bf588f56bc8ba0b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501b994af9706d0dcbb76c71c550fac6f
SHA15a4329f215480bc573ad642e48fc75aab89b278e
SHA2567a3fb26dfb2968ebd74943980a41e209a5e3213c7bd56d2b089f2a84ccde2303
SHA512eb1e08adbb45ab9c5d23cb1efb7b84b67c06913932c88743fbe360d4817b74bb1abb157399034d473a24a7d9621a99fad05ee47b8e8d57858a02570bf701fd92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a26737f826c3be4f97bf46e9dae3ffeb
SHA149de40b26db1ece754da53e59949698024b124de
SHA256ce14805ca96cea60cb2892f8f133846bf901b8cd2a5f7a5c4c339d8b74fa6c53
SHA512e496eef60efad5acdb8b94fa1fa0fcfc3b2b99d8ace7821ec7984715919f6e9cef59747c035de274df7a0d597c2402e31cc2bb7c48a14b300f2103a962c3aea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559199fc291aaeb18d7f7d3b9ae653e9c
SHA1057f44042dd070ffdfe1ee00fec88ab77f9a2711
SHA256e4af45aadffaacd090cda6d047c8d94a92356d2ace4b9457ab75712e6982ed70
SHA512127d1b2a9b951ecab3b5dcbf07ce37e5b4e3477572c20c7643fc8dda3888f3bbe9b6939b4befca48eec5ac4ea79dece60428be74fb31082f1d178860784c74a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab8fe17f22b2caab133d7883f221af35
SHA114b4a012252eb1019d7153a9739ed674e247e229
SHA256d2a5ed72345ca8557ba2514485c4c9d36558608cc59a974e6f475d557a9f9c77
SHA51242abdd7c669b31b6e8ac366d8c1c4f3b06702c4fa908f2fb3f142c370515cf165faaf2f6c5700db33005754762344144795f8aa4f94aed9c677e2645594149d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5264dda481184b782d1da5571533a476e
SHA10500d980b83490e5df9fb3a97c39dee57ccbf255
SHA25654f0fd3bbdf1fa72a60749fe52b1786ac80618662c7b12c838f326df7d0945fa
SHA51267ddd56baf8fd0bb1d0628ea23a0b833e71c8f0927d1fb8463569957d39de590f9e653dc928aaaaa31f55993b98f52a86479977c802c4d0af66fb26ddb22c893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54170f16e61310f1a5a225f0ed4d6bef4
SHA1e7cb1b41cac1735fdd0d15b6b32a62d78683d66e
SHA256e2a944caa74f2c5c9669a97e9817be270073f2b68c4d87d782a388c747eb8c6b
SHA512e34a985420c9d144c698974426e64aa4b7f50fb5aabaebea5d4a3eb4d2d7ee292795a6d50ca7371f1cd30f18e790d72814adcda5e07343bb1adc58ecf9346336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b75276388f45be6c81b469963fc1deb9
SHA18dbc289cbc7749416bc6a8644fc3a30378075460
SHA2561950afafe713cf01735c75dd0600f6e5f540f95d63b1af9defbe8d37cc71f597
SHA512a5efefcc2c4f97147c82cc9803885b74dfad85e9f2f4af91888c00903b3d757c0377e2472f90fa9adb3090b44b59435efef8b001b419bcff84abbd23c209eddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbfb35ae9fa9554998cf6d0883b57de9
SHA144af657d21acfb803f06ea7e34e34c3b628353e2
SHA25673473cda9dfde2a900595757850110a990cac09ae0211b0f8931b13d7ae481eb
SHA512f6a39e31e7fad743a24aee1187d595be1621a4ff44bd1b85db582b072c98e568ec9230b2ef73cdb2e5eaa0be674506e0e6d02698d04e3f325c9d270945a03b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542db2d8d2795072f4ea76c717cbf30cf
SHA1226f88cf5024b05600a318202bd65fcd0fef1a04
SHA2568abafdd0b3171bb0859bfb3e5c0dcff43b94df733e9daaafb385c38ae18579de
SHA512f1b282400e520f1ec06f51844d1e1ba305774a44a520c9a52220e570409237b43ed76f54920bd1507a72fc7eabdcbcab6f954a49b7eaa3fce89c6a57c271c8cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca653a6d487021c7a534876bbf0a5719
SHA1a5265295ace98ac7ba3b9451067042226ea16a85
SHA256e28387a4e37e7503e3015df9a90d0bf7f3d1a19b44b79be5d1b75c293cb8a9bc
SHA512045e5324bde2c32d1f7e391900a8388fa42650ef8ecd021d3289cebf6d1340e19fb6c348c206d2da8e8b364d9e6a8138acfdc163ab1238191fe3384cfee74fd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc49481200ed1bb5fcdc381008473d6
SHA1f35c79b5af22a1a6ed6f19f14c48b732e4b8b5ff
SHA2565b01ab7550da08a6cd97439d44a4824138c40ca87f8996a8020c67c98e04b82a
SHA5128f8716fc6038ac9b8daefb6dd756fcef3f5f055842dfab4fada4318c4edbde74bd8c9caa8d87a9108bb0ecabdf9793ff221bc5e2cc77534e79fd2de6a8593f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf2d7d0542dda9eef328c469b6c6f14f
SHA18c03c774ceaabc751b96e0a2251a861e98b85ef5
SHA2560825adefe2674f96acbe52d0d50baf1e8fc54ae8baf6344198cda3e1f65ae0de
SHA512b1035f721411cf696b1c59439bb3fcf3a71f84a4990e0fe4a54231d03e886e141c800c0dcb9d3ed82496eaff46604135d8c23fb2cf342f26d13cc25a64fc1534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b68430c519652bebb47434b142005aba
SHA1082f411d0d0943deb4484f017066eaa59a6a8f99
SHA25630c276f46c523263ccda7be6c107e196bdb6c1f40f4948dddf6f78db1faac6e5
SHA5128d89fff12e7a9444a2298e3d9d9c73e4946d8c998fd581e221d28ca3a8ac4c697f0060a22dbb1102b8dd2fec82035cdae9de30ea249886de5b9252002b006479
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b