Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 08:10
Static task
static1
Behavioral task
behavioral1
Sample
d1778e1a396db42d191c612b5a3e6cf6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1778e1a396db42d191c612b5a3e6cf6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1778e1a396db42d191c612b5a3e6cf6_JaffaCakes118.html
-
Size
23KB
-
MD5
d1778e1a396db42d191c612b5a3e6cf6
-
SHA1
ef99df5069797c8b13e5150a8e0d6b12bca90716
-
SHA256
f34d3bb9e00ba5d2921ada4af496193df2d98143579c127f48d899f15be09b9d
-
SHA512
959af45f4d8f8f6c3c3fa65593235768d9bd36d6335ca16d4e216e14453a2fd3b8c49a4d72a95f437b56935d1f1b367ad89bd2cc6842659230af6fa50a23c607
-
SSDEEP
192:uwb9b5noinQjxn5Q/3nQie2NnMnQOkEntZ9nQTbn1nQ6v06J4RnQNjMBWqnYnQ7T:gQ/fv06ksM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c050e78bfd00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B69DF211-6CF0-11EF-AC30-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000006d86eb8d4a7e0ac9e84a26563505d7b4c1eb430946862aabd83519be86e7657a000000000e8000000002000020000000a06b7b67acfa924386ee44434e0a37e52e1e42b39c2f8193041ba8a97bce9f1b20000000a513f203a0d596284698d58ebe457b53f4d64dd935f1020674091063906abf024000000098ec01788ad42d03af8a557050bc90e475d753dace3f7b18af451d79d9fe5bda1a1bf59a2c3c3f74dcedd9bd8096c3b02bff6e4455de412c7a277bb9d0485f0b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431858526" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2892 2980 iexplore.exe 30 PID 2980 wrote to memory of 2892 2980 iexplore.exe 30 PID 2980 wrote to memory of 2892 2980 iexplore.exe 30 PID 2980 wrote to memory of 2892 2980 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1778e1a396db42d191c612b5a3e6cf6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a66872bc939595763ec801bf96139d65
SHA105e87b7da17f007b9a5cc2292d9d138df9b4e861
SHA256e617066185bd91bd9891e02b575688c24c38f64cdfe19dce28c7bccdf72f3f21
SHA512a89d970a7df66ef41a7035629494a5ed035cd9a42b9f18675f4f502b35182d13ac4c9fd8bccf13847191d8231e6a5695259ebb589e1812e2695bc8d71ccbe1c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ef6d58c6c239848a1e9712f82646ec5
SHA10057c854a2b9e21fe9bccedc3974ba3908db4d57
SHA2567b80ca75a60d1bfd48f202cff75b3c1110a2bbe14c21aad60facb660f1842528
SHA51292df6e2420808e77c0a1da59fbcd8a635bb3c56379c1a1b17cbf2d028122ccb215f7ecb57c5683447484020f20858de7bae87ac81360f278d5fad7f33cd41b63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561fa5cbf2cbc483556d6523b228db252
SHA12433ef3eab456e5c4faaf6dcf610c4d074858354
SHA256ccf11fad1ef0b4c8a1e93abe7734e1dc2bcd63cdc36bcffbe19a92b7aee99e05
SHA5124ded6c57c8a08aac5333df8de582a67cad969264c02bbd2b8bd41ee5fd794c6edbd1b129e513a80892accc6d744a603002103e90461ed11b84f84a230f82fd19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597a04977c232d42ad28f7137ef2c5d86
SHA178783d7c476267198d32c2ccf246e62fde2e50cc
SHA256c9e367c6f642795537b16c32bf047e13522946792fee4d829c422c448073f03a
SHA512950d3f898911ea5c8e545825cbc2ab0f06eef9af17777a7a989ae6aa535d4dabfa143f43758fc61b02fc42b2ad2e21768edf392ff5fff45d1d42596c9c6e8c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55640fd31f84a8b81e011e26c3c7d0632
SHA1b8987ea0013414a25510c390c1461f7bbbff22aa
SHA2561a854059f53a368583933b82cc5b1a35878fc57fb2ad8f5dcc8568ecde85d162
SHA512095d318deb5b8fabef3e3185d8bbf143fcdfb8f20428c523b4e732dc7e28cc8e4d409e9599ba58d6116dea813726e35c7b5d1c3004acf9cef3e12308f84f3199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac744c77f4d9604bda817ad02429dcff
SHA1b177be9136fc83a86418bdd6ae47a08852009e21
SHA2566a3029a13bd37e8a62ad7027b94f60b7d484291c1001f878d01eecc9fadc7297
SHA5124a23fa6b597b7f55a04ac73a5caeb335bfdd4dc021d3c02a3376d6a58740f846340321afd2c9056fdc7f62a92288fc9d741a0c745df4948cd794e44a58ada873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533d5ae68d74dc5c8a9154d65540eb474
SHA1ce33209f5d7f30ee587e7dd9717be621e3ed7bad
SHA25654cabccacf67ee948417abac206c89ce51ecb4d98d12b586d241e2f9ecac3ecc
SHA51217bc4e90bf83649b31ad81acc6901171088d865384a98ff03e5f791989ac2129f829c9610f6420e1a0671b6eb40d21d95cee128b8185c2d3f05fa3e41e24b19e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fcf9c31d014c92ba532a7368cc6809c
SHA12f90e3492f0e74ab41fe12063f3385a346ab474a
SHA2564bb6636a66f9d7b51356f85540ec95f56eab50f3b67e37484ecd820dd7c88b98
SHA512c11e8404b3f39538afe5c81d0a9d2b0da5548284e81a7bdbacd29843897e155d5a9bd12bba9726a867602df7ef0d85e8da2a5fd4e9c336e6919d8be279180983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb25824a2ae1d4b7821fb56aaf567930
SHA122a553e3d1f4dd2e1a348a80d12d2c287f5fcbde
SHA25660c781a44874238f5f6c0dde9607a7335c5b067b5ecd65a9eaecc7a217e82e89
SHA512093ffe87dcb39c435c4cc40d7a745581f27832073352cb76372ec0c15b102af7e664648a003d23e0826b957f7881c93101af812973f84f85c179eba244573b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522bd35ccf44b72636b2a073542b79a4b
SHA194fecd639bc87787827b2a95cf775003008c8eea
SHA256f382bb8dee5af0d570367094ccca6aa19072c2abf0e3400edf7f4f6cd1a0d88b
SHA51250006a7a0c941e4c979216536399ed1ffa27e18db53a805f48b0b6eb87b0dbff7dca2488727298ab79d48dfdefa6822cf12aeabd972ccbc1f38d0bfd601d775c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55368fb1e912e7d37efd84b011b3b7ac9
SHA1a783e7131226eaefc867cfa8334212c6d2e9f24c
SHA2565e7267021f68b8971905ec41ce428094a56a9a60d37cf011ac959db0b90c14f9
SHA512b8b0517879fbca535595faa575a773b6e193ee417f5ef34c2c4f47ee197dae3784838c4c492d2cc855f436a111ebf2ccfa5ed457e6288742274ede79c16812a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a09e6110313fb5052bcc343ea4b34efc
SHA152ddeaf3c25d8c22a185ebd4823bab2739321be4
SHA25601528155a6f32f75e10e353dc6b03462d3d3edabf8b50c2c3e603479e475ad89
SHA5128e5695479637ce717ff50ec816c76782b5f1de535a53ae257870f724ec953c94a17f581245402cf6160b62f59611df538fa6d26aa799c5bbedda4ea71177d576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5771221565c1d401c167022b83009b5ee
SHA1bf1a3e9c712fa45e2e9af43a302cc61d09f34f7a
SHA2568fab45881836c54b9dd4a267c4351d069b49f4021255d50f8a0eb04bfd39464e
SHA5123f5c06aa93565519e699961cad17489a85fb626cbfb26007d3bfb66ba5f94e6328cb24120fe6e87923c38c20b2a9c4e65788bb583153ecb01228551719d3d9ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b214518366c8dabe5d7f0e2ddb535bf
SHA1c1b85e4164a31afa2ee7c5038025721af5cacf3a
SHA25629c10153fa84ea1c7f8dd3d4fd5fedd1be4eda69762680ae4c1fe6738a797055
SHA512f145c2a454123c0e3c4c4878725242ecf71f5d98b738f2311e68e8f3fc592ce92a8afa7870c8ae4b16c49726b0b3406a059299f3f0e00add3b2693c6b01152b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53656207827234e8d6b29b99b29300b3b
SHA1175bba1cd1b128bace6e635858e0b70d5a387d89
SHA256671ac85056ae4d9f4f62030eb51813ab049591c74d249647df88df1f5321cb15
SHA512d374bf671137d012b07e77d45576680f59a360c132416eeec0d45f7b3bb1d434448646ee3037d437c5627e10b1fa6f21331c1bd5098a5ed1a92feae291270319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53551310ce00fd502bad6d2ce7d2a7b18
SHA1728065b7910c72a4afe1d0b426217007c87c1524
SHA256ee22ead01d2d3095e40a83510dbe7260cd198ba97d8ca65cddf1f614ee3d854a
SHA512ee9a7dc5b993c3fbf6b713ca0a7a48323eb0100e617787e65a5285b48484d45fbfb4e6dfbbd1652cb44212fbf03a2311f4eb73173f2a6421a0c45f58f71c54b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c90e083d8a0ed1b2aebe17346050a58c
SHA1afcf99a9e3204a2cc3c531f07cc990b2e1a566aa
SHA2567e63d0270ebf823c6be009efa3ff14ad676ae4556700ca80bec4d8fd2b64acf1
SHA512d415417a60597ee45377dd51484e7ffbcb488e04a94a02149821958884aa637c9f0ae45c1811d8d6dddb538690fdea2aeda150aeac9aec66f255966b975d431b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e615639e9fb0118f6e847076229c21d8
SHA127d5f58e9a3288337c01f2225617e47539cc3166
SHA25663eeb61ca9fc0197d08da8bc60948d4fd637aba235bdee9fc561352bf5f783fb
SHA5125225798e10b001ada34ed8bb0810b4eb9c57ffdf9d201f33b5a630b30ef58a33a8318d46b89e631a1d9f16b6f82215728dc81a78ee40d63a05726cdaea50e99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5889a4a3abdcd870292583c46b307c75c
SHA15925787242985fdd809144ecbc7bf0fd69bb848e
SHA256f4637c039597f9e44106d825b36bd9ffe3a31fa3dccb09e2133c3da2c6c91973
SHA5123b7cb6c34820561529fe67af268bace4e4bb3a5d130ee459a58c3fa3cb3a7367d23f3ca7f9953332115c159f3b6fda61514060073ebfd4932ec5c57bbcc55b8c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b