Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
dce6611e151ae81bfc2f4582508b3c48_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dce6611e151ae81bfc2f4582508b3c48_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dce6611e151ae81bfc2f4582508b3c48_JaffaCakes118.html
-
Size
10KB
-
MD5
dce6611e151ae81bfc2f4582508b3c48
-
SHA1
bae7b7b0a05fb58ace44576933bc0fcc74700dbf
-
SHA256
2e964fdd1e3785e26c0afc3edee392ed539a85d79b1ff895c8eded4b3eed85ba
-
SHA512
0a240f37c18eb4ea1f02a2bcb1fcaec55ec657b1a49ec88fde37c1eb48971fbdf8b74f289aefda34052c7eea9f57bd9cfafb52ca3048b4c6a897ecf6ef700ae4
-
SSDEEP
192:aDZUNcdeyDVm+m99CSI21KfXrs3mzpaq5243AwIQZHp1GZo+Q:aDZU23DVnc9R0iE/2SZN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000f74056a29e01c5cc3ad6eef364c52fbe95d806b5e844ffcd4df54a6fc80a1e50000000000e800000000200002000000092a9defec87e66aa06b0eb27b63f9df249e74e7c491c18d654cf6b2c2daddb4720000000916dd14c4a0b8fe6be7eb4644dba962c28694c5e740ebd2cb1c49b7c37fd6277400000005674e6e92bb93bebdba46abf562cb7d9ab7fd1b9b04425e677597e9e6e01ecdfc6618d4b2646d1fc04d7ef6b95fb069793d79bd385d15da58eb2dceca9176506 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 402bc3914905db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432330983" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000be0c99bb8327f504845465308c916cb36ed9762d86cdeecb92412ba76c12118b000000000e80000000020000200000005881ca86c4077033dfdf4c22bbc38998ac01e29f2627f753b8733439a04dd3d1900000009ddd547b9965ed7012f1cb513abaf32c722e2fc9e8f123304c232cd9cbae836da49c67e01546b05cab17aa425dc0fdedd90ee59e1903d5a87f359f215bc714c9cba8cd12007994e426579dfeb4b600184e72853dbb609585fc4c8fe1b703c67e310b01c8648c4ba89b316990b46d349abfbe8a18bc8dfac555d30d14cd5f4388a348afc3e37446473102ac8bde1bd1b740000000cd8028fee64f2d6bd821e72ff801d26ae0a1134642fc78f7608b9d8f5a650374c0dffc8d5d087f1dad29c4034dfce001506762c1cebfe6ede4e15cf6588fef4e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BCE2CF61-713C-11EF-9BF0-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1716 iexplore.exe 1716 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2604 1716 iexplore.exe 28 PID 1716 wrote to memory of 2604 1716 iexplore.exe 28 PID 1716 wrote to memory of 2604 1716 iexplore.exe 28 PID 1716 wrote to memory of 2604 1716 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dce6611e151ae81bfc2f4582508b3c48_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d9d08b7620fd5994b9f456b9bf75fb6
SHA184d6a19da34e7df7978e085334e07cb0396519b6
SHA25694e9e5f4907c6593d86024f0223e1da65f81f5f1b53670e73ffae72234dc58f0
SHA512dd65b10daca10069bb511c0164fcc12038ca5fa770876e031dc1dd9b5910f6526e406d16b26a5d9eed8a7b5be81d7c6cb0ac76de4496c8ba3dd0befadcc6c515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5ff3db1a927a19a7c4dbe14e24c93eb
SHA1b4d32eb9471248b84719e79e1a1be70338277ba2
SHA256450417c6930fad123d0a250ba53dfd2b52a262afea65cead84ed51bd0f00940b
SHA512f8d336cfb1911b1dcd3b0813067db6802c7abc2989b8980bf87e6eea925770b15936036eeb20bf677d365385551a76c3c264f186efe4ba75e04f1825b13e8f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5232aec22b0b4fa2e7b6ac738ac90ea37
SHA1d46d29e836760c32ac630cd8c0748897fe20bace
SHA256bcef4ffacbe2ee0b49a308cfbff5e289724e47183ad35f818517f99923575dbe
SHA512ea7c4b1b60d762becef0279a2eb0fe0e1b5fbf7024135a404009a69f37d389e3dcbfc995bd4520bfd0b8c6d480114f3d06c5d3779b5422febd4b8f40a7f54e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5267aa225bc688fd85b1a305f758006d8
SHA18862369eea5a9f5ead57c0ef745681c34c7b00a9
SHA256a3bbcf01f0e99ecb900a2964625d7ba3a2c15af492bfa90c046cffc480fe76dd
SHA512650914da6d4964e90d7d37e02f4036f130bdcd1804d04ba956d02a8aeeb6fd381a384d3c82b8fbdd153084d0d1a6238a08743f85b9b939e812c6a699a0bca2ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e2e42536c0dfbbd39ae779cd28586ec
SHA16ef1185d58e5d9b096fb58f9b4464ac8344ce489
SHA2563c210351726bb6de5d37058b8ec3e1e028b136498d41d20e129bda7f6fb37732
SHA5125a2b2d9ce66518706ca720e94db18a8311f7c166ec53d2bb913d77bd29946370b51b1cb24d513bd8a39d8df158a5b7e71d93ff0f0a7d9c02f709e57c822e1d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cae75b41ceb7966154091f346594c84
SHA1cce8d0d12bd642a31a74b293fa81ba20ef26a608
SHA256fa3bb7adb9e04f25c5308c93469c87d5eb87dc6410e5d27a2c0d278c987114a5
SHA512ce5f13be0d1d252a00561a076817cfcff83328665555a3e5ce898490b19dd9632f272c9a32951f5586476742ae45cb5001e690d8451502e4f4349d3e56782d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aedea8aac44a3dd5593599c960ca19a
SHA1be63e86dda8d5e1a7c43daa0be3e62c79fd25d7a
SHA256ec1ca13c9bb82670a772db773cc8ff5f78183bb4f510207c9269c913f58e08a6
SHA512f8c9baf2db09e40a55b810282235076849d229b1ba95be4024d9e534377ad5141520222abe6fc7a2e168ef0c95be512abaa07f498d663125c3f929e34056ca26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533051a5d26a170cb50752ddaa5e0d6c3
SHA19e933e9e377d0215f5329b2dcd8fd5c1f20d7845
SHA256806bd6a7782ad23b4a06a34d470eefb51ac52724bc2729d6d29f408cf689d2ba
SHA5128b70d7d571bfeed83f18e99068bdfbb92ac170f4c2566218bfaad87aee237d46ec51ce1ea82af7c2564e9e4c6c00568870e28d963a03f351a00b1b3f14104264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a17317e3706f218c5e3e356596a9f2c
SHA128630cca3694f9bfc7bb7dd4cefb18b2f872325c
SHA256c5b41ebae36384e95121aaa8be2e4687974c850bd7b4081d0d2c5da2dd9b38eb
SHA5127a17122b8649653c2cceea2f916108c6644db47c237bdb19ac6825acaababe48887b3db04f39f0287da6380d6642d51b55ded8f694c6b1592720e7441cc550a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8c7d780a4c77ff12134ccce54da984d
SHA1436e0e34d4910ae5ef68c73eff79e200e107d536
SHA2569de5f818fcb21271865bfe252ba54d83fdbb27d3cf41a2932b192c28f34e1d28
SHA5122b7d0a5ee8e8207342c13b80957e8100994f4598cda9f3961b47009e52d675a8c3c1edcb66680f2783f61e1a2711bc7bdddf61b442f9d6329d315cef7e455f26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1df60bb92ce5eb630b2ddf69d1c4c0b
SHA1fd5dea6336661fe50a2b6bd800fd276b8ef29ebf
SHA25614ae07a3cf4a959f9b4b06e7bb834bcb47f1d2b14161bb7cfc5a7b7d2b9208fb
SHA512428fa51107b18e60a0ecd1f3efc8e2fcaa65f85859ce0654325fa70059e801df0b7d3b02c09f2eb61c87ffedf0361ad6a176f4a8795fb0ee092565127a3acfd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5237aa8c3d34b242b9cde9dcf1f0d5548
SHA1c9eddb7901d13dd4f4007321facdff6388b657d9
SHA256358bd15048db55260b400df5c2ba39603f219858df83063a6390771b97866cce
SHA51218dca5d126a29323972252da888ca6ac11384cdd165520e233020494969aa93bfa2f15c1d4f9441d05c64ecdbafd1ed98126eea78d55b3bc0a0c64e133ef708a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f89e8e2ba41ee9ac7ac7ede6e7b6318
SHA14884ba25f2db411176e3f012e2a3e5b2392e7ecf
SHA256ac1be4d0e9f657450487264cc061a744269ea08dec74a81d6ca395cdf52ab87b
SHA512f77944033322b95f69b51753abbda1fc435a6072f45ab20f5bcceff50e6ff4fe89860ab8f8aee30b6927bc0626188f65de0940ee50dc31db22bc70bf93770bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a46c382bb51f0797850c8f7045da450
SHA1dc435ee47251d4b7bf5e18a891f6b10e2f73a28f
SHA2562f62560812a829ec4c548de439c07771f90c08b9038383b40cd0fbaa5382eb94
SHA5122924d5b755a7e5329a253f4f861ba5e7cfbb46cd6aac92bcab07799c7aff85e95ec48d52f63a361dee351c61e43469babc76af7f4147aab944d855ba6a574939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531a8e57153c86274512fe1994053790a
SHA19ec837fa8ec39d9933db477244e9b108f8152eb4
SHA256a7eb653f47e3f180dec18217505db2a666df6a78c2a28ef8f082be64a5654440
SHA512e5f6ca84b88ae47f8afae38d85d08c6f232453654c2489581a843f52cf8d8d0c9dba424caf8f52e0da27124fafcf616e25cfef805ad031a8b335ed2dcaabab6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d21eb2590092612c40cd673ee9c42198
SHA1bbad0ac40c9d06d22920ea204a58247376f8baa9
SHA2569f2556c9a0dcc6772e561994c44fc8855ed49b3d85b1668be704a56012e12321
SHA5120fa4c6ea25f468eb083b0c0570af551d5a1d8947436b6a16123bdce45ed0dc0c64524c40ab0467b04005eb95ea6fa484ddfd68a6ca62de313db1a5c8236a2c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3152271e07ba34835bf67ae478a56bf
SHA17d6de05ebaf1c043168b0acb491c638e67155d04
SHA25635c21eb462683e8dee78a7d9dd234881fd4072c1823e07c162c4678b2267905a
SHA512fec5451cf6a1b6689d8e682b58965cd19253c5cb683ebef75e448ee40b0e9ebece4ae610b88443841667de2483858831b6aafa93a165df4d58d1a7f020c1b3c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5579f698eae255075cfba0723785fbdea
SHA12da26974f494d12e645abd4074586f827ca0e603
SHA256bb3228d506b9fa8ae1e773ff86856d1ee0c7cf276fd153da4f9ac8747cf99a24
SHA51230d72bfaf6cdaa8578b86827569a08ca9187f1de502fd8248ccdd3cdc9e54193bc1aac171f917c1848f2ae8d4380160cc1193f231d057df45883be1ec2cb457b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a6081aed4c8f81ff244d810ed5c3a93
SHA191f594a2656878b0485c32b20079f29d0f828a2a
SHA2566dc78eca497ad2a542489dac0b7c5393e2fb680a898ca2cab7179f5d97df1e5d
SHA51287002a6c8abe55eadef07b9aa2c4bd1fe18bb4dd32870b3ef2bc791ecd02aed988b82793abf8aa02bdcc63ec00dcac952c1808b3670e8d30cdf03bd357100707
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b