Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 07:28
Static task
static1
Behavioral task
behavioral1
Sample
4db56701-499f-400a-b747-08dcd6777466.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4db56701-499f-400a-b747-08dcd6777466.html
Resource
win10v2004-20240802-en
General
-
Target
4db56701-499f-400a-b747-08dcd6777466.html
-
Size
89KB
-
MD5
8f9cd510458d2e0b1c51789d9f1807ed
-
SHA1
8072c101f797b4b114c134af63b8aa103687f5e1
-
SHA256
7da076686258ffec15c2849679badb14f6b90abbd50dafdd977722c53facf505
-
SHA512
3c7cb843de0241dd69d0704c2257164fb24a4b3f0fd37384ad8823d6887f4d9888b8caefc6bf9b91cdebd4e3016a980eb8c1c5ae13a371888fa17203cb3c9236
-
SSDEEP
1536:g0ejckb/MbMPpFCm2wySzCX0W5zbnkGTrWRDDLQEYAADwEUiCiSxazinQ5:guy/uMffCX0W5zbk8rUD/beC34n5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000004c0ae662a226936d95be73763a104464bba6d011c793e253e767ada424a3c3fb000000000e8000000002000020000000b2da938b1c271ff2f6132eb3a47ac1db7256a4e807cfed3cfda1ace2833e3ed69000000067492037f7604ae1f31c0f6b578fcd7a04d34c933f12d2a761e45a6afa9383b0c8d53825aa91640b271ed32b74bba4cbc1e844062e20d294e06d54d70f95de5c2409c2c0e39840df1d0de57b487b62c7cc992a48249a2d4a82986ef4bdeb2cbbb0c5aa54dc150c8f19872470ec49c28bd788908377d8c07e2fcf013e4ecb07b3d7339159ca071c74d9111f3bc86ab94240000000b2cb969e981602238016fc48e01d6710176d43ba965ab14a4e43b3bb7289a0dbbeca5d11a6bcc924f0f76447931c38d8e010d703a1f3960b7221a3fd453457ee iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{989C5CA1-758F-11EF-9DC4-5A85C185DB3E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000db797474a22f67914362e8ba409e1264ea47ea2f7aeb5ce3c8e313ad1dcb17c0000000000e8000000002000020000000e80d36cee61cd49399817e492aa60c447a25a959b0428f927434e5c672f36601200000005c569ebe7bd088c347946719f9c15ef6fe7e0f07b24aba56e4a7d856dbf33c80400000004bcd618c76bc98d0d06ae29cb2936ba283a0f9d1c995ca6993f3b7977cb73da4afcdff8b0559421c41bb4324f3a1413f1d2969e4abcc8bdbdddd1c67f023ac39 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a093276d9c09db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432806374" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2488 2248 iexplore.exe 30 PID 2248 wrote to memory of 2488 2248 iexplore.exe 30 PID 2248 wrote to memory of 2488 2248 iexplore.exe 30 PID 2248 wrote to memory of 2488 2248 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4db56701-499f-400a-b747-08dcd6777466.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a192bd95191114d68df3b383ff250def
SHA15c18feaa28344c826c5561cc886c290b0a85cfb5
SHA256614a4b661e4b1ca87018170dda5ae693c3f6880bb076aeef38d2c99b16de0acc
SHA5126912ebf4a5ab30e491aa1350e57811b35aac1a2d9f705bb670fcd21e9d41114bf6aac82b2a3ee9bd352a5525bcd4cf1cf42219d69dd6a057961ff24ac502fd76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc080200d723a59d6b455e261ef792a0
SHA1cdab4ef5603ae08efc856a4f7b0ada9f5396c4a3
SHA256c64d8309a8a99f75443808aca8c22ac73a745dca56337c1a7ab0bfc29d9d84e3
SHA5125f25c4a71cd4f9cb06cedbcb73bb65d0bbb282d64b5b54f5f68e82361957816e75f884ab6291254c6c2586dd2056b28d4fccb276a7fa53d4bec914742ed8109d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b291862a09874b6102acc59dddbd0946
SHA19c1637d0b3a3c4c7df2344f6ab4f1f5299469489
SHA25650ab4d7943641dbd41bf1e922d02a939cc00502105027179d73048723e409c09
SHA512b70231d979ba3b2f7a90c6d3bde336d362dbc43fa51dd20665e0aaf26f5d4cab77babb44b626f0d763340b96d0cc81d49cdfac1f219eb36057af9c7ec8144eec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa50ebabf94fbb85958bb9d47ad58fee
SHA1e4a40a4a9f6b16497cd86d1fccf9af139d204ed5
SHA2562ad0cacb07f7309b3e60e0f8e79d39044e83d976f9766888062939e071ef2528
SHA5126e879e6b25849ec641925d9331f16775c33f1b1ab77bc3aa2271a61efbadda322f1a975f3ebb7a04070287e63e914c19d107ed83276f95cb381d32b7cb70154d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deea073f9dfeb8b0f10ecd61f824e5b7
SHA12bff9eb6f3c92ee91bebdd0bbb219555e92234ef
SHA2565e2babb31e5fc83e53e8396b13f3de3d9fdfb8fbc150e3282b353e192cd4ef10
SHA512a65b1ffb02ef09f8445eb31fe6339bc13761ad3ffa588e62cf7acc2d137c288b85727f0d1746d748395ee52aee54be766db356081ae600db076fdccb59fb6540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2d5c73d261ae7e90d5a3accf75eb7cd
SHA13a09a796e10cda333c34736a8aba7ed26bf2316c
SHA256038d1fabd4df365705189f6991930dde905f9ae997be2ef5c9c8e7a082ca2095
SHA512523f985ce78bd719b31b35fd952d06450cae834764e53c6e29b6dd175dac234e9f57113ed5f78e3ab005173161aeed8c962e1e478f41af39e9b3e20f882528e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519173e445e5fb8746fb1908589b46c85
SHA1d6ebc32b1dd0f2a0d5a6574ceacf5a0cf398c7fd
SHA2560a05d99c37776061570130ce562328c0155244342e2483204736104dc07c2fe3
SHA512e266bb31318726f0dc34c90dbaa8323eb1caa9e2a9ec926fb2efe48632319b0992eae3759d699c97358564be36c1f9a1306ce546538dda30357dcee65d0e9c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea65c89a20341089933ebd8beb6c635
SHA188f3c4a63a2478bd96a7e3c1d08e192e41d87334
SHA25679fae77d92020af0b26d0cdfcb08acfa385b16caa118cefec16ff80d2046753b
SHA512ab4f524ee871dbfa25c7bb0fb9b01793ec3fc5640ca0559d0958b77b6b9876bcc81c665bef5f08b3599a9bbf50577e31c1604e0bfbffdb048d37db58c985982e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c55eba2318fe970cf9472237356162d
SHA154213b489a7069157190a4262421aa171f9c91d5
SHA25610b8e72381a0b9e23461bb475ce598d9cb5165e985bafbcd5305afcd6386f7e0
SHA51239c3da8920a3b39dd88f83ee72eeaa6741db075b09433fcab5c51e7c83af08e8d104d0e5d7a57ab970039fe52e89c0ab565fd2aec4276a8e199e5c2718e31fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5241cc7b9399cfca19f9d4c858e34c1ab
SHA1f02f21fc39334e7780607d631f012bfdd3371bc1
SHA256f81ec1992564cf6fb3bbe920dee1484337c877e72d2436ad565ccbc808ebc860
SHA512fea12123f254aaaa6b10b6c9e4b21a5c9a6e333e0d19301503c00de89c8c623381edfb05a4ad35e71f562484ba7e4f33b6544b339b1ad156987053a77db23025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575eea2b605dbf6b1b8eed1f1a6f76d59
SHA148668d4a5ae27e52731bbfe462e0ddbb1178957b
SHA25605e90170efd4824c7e364e1e3692166e69e732cefc20a2f9b006db15059d5baa
SHA512562f9e1a567391b14f642250100a497184d2b3b80b591e213ca232a1132092160fe74a58e39ff97c6e09a6b71adaf25a6ee3e930a31975956af398771ac4dabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a33f126957a3f4b065dce52d9c62012
SHA1160f6a45c97eeedf94b22e0cae708fe778657d9e
SHA256d74545a078eba90104f03ccf6bfa68a1f9f57d96913bf363df11f147faed63e8
SHA512be6a849c4bdf33c567840a6fa66417f6d2065db7ad840122d58986772ef308dac84b95fa26069afdafa6f02027303a8c7de9be7071aa8c42e700b2bd8e176dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04f679c63a98a28aaa017681215263b
SHA16d89a787837c11ed8473601bdf180f01e7b51767
SHA256c11f2fc7e7a823b0c2e953ef334f0c6b9a3ea6c6549e1b430223041b215994f8
SHA5126f54020ee022d6c124793a4ceffdce2dc3daa7a61160bf8118760c9745eac277fa5d1b18f75fa44889be10070d725deaac841b997a9b98258750e6df7af0fecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c65ed4706626c85733e0888d8dcf58b5
SHA14c28a8be9d86b9cce45475ba7234bdf794ada613
SHA2561005eaac5d66b9b6ad0e54b8e7da25304bfe4b4cd2dfd7ca15a26b3b7ba0ae31
SHA51253c34e9b7236228f25b884bb94eafcd268d38c56604472c7bab1d33ccd042f4767d0adb338eb1397880b0c82491cafe254a7b8b743f9fce467e0fbe5cce10aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5d8dcd0a3b500fc5953c5137df67b50
SHA123f5e5fcb10f605354e6babd734eafc4a6370875
SHA256596dc0c6979dc22bf399d9b8632ba665fdfa99830c50ee04006bd8882d90aff5
SHA51295a8cddadf3791a81c6e5043547794ae8fe73f8c7e803d87de35a902181f51984af5ff9ff09ee1f49cbe8d8fea8b84a332aad3d0152cfbfce1b3bf4b1ff0f211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59103770958895e0aafa34124e57302f0
SHA17ce392ef10e0c037a38784cd2b14d3c1b963fa7e
SHA2560a6ebcb9783a7c3770a233c6144dda29166d12d724c9038d4940a1a6b0bde9ae
SHA5122d3671f31196d22a11bb50be9808220a142d93c00bfcf062f408763c290d2e66b48887a0efb1ca78efd80dd2463966f1e69429d437086e529f454475ff0fc01d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5430c31035cc9fdca6c8e9c65863f9734
SHA1a52803558b9794d40b5740d0158e16c87a784739
SHA256570233f189641efb9ecec14926de99f7a95ac3aaad78ec19f3614a4f8039c838
SHA512a46aa6526039510da51c53cb1535da6607095e6fbc3714597872d010f14215956c4ed863fb51912c0c1caf30fd671ddce3004fb718f76218c1be20f3c8449b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e558a3b0f68ba286e59917a0769e64d
SHA1c55b7fe37a47de095d486303c8b5ae9200b96496
SHA2566ec1b484d54ee7e25fbddd4adf368ad2847bb42e7b0db8d41364e6c49158ab78
SHA51207907c97d3f793a1802b97102bf9895dbb846ba2439cb3d2ad4ace821e881b3a8fa4eb45c8090ac8e85e68ac5b752f7ff68301035f07f19b849349123a4dd352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e87226926130c3dbd2639a848e283e24
SHA11d3cda1c6b0c279281a3f9db748a269249d5c2bf
SHA256162d177d05e7b8d76a98da25a804c51dd2e6cf743199783ba4508dcf41da8a90
SHA512d943e6a8dec5a966b3815786dbb4f7df8c3a6015c0a366cb6f373f2748e1d26203a8b811e7bdf52c4485c1fddd1e873ad726a25517faa8e858a5d499a57e8514
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b