Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 13:43
Static task
static1
Behavioral task
behavioral1
Sample
fa81e1cfc1a5d4e5422ee852da94d160_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa81e1cfc1a5d4e5422ee852da94d160_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa81e1cfc1a5d4e5422ee852da94d160_JaffaCakes118.html
-
Size
213KB
-
MD5
fa81e1cfc1a5d4e5422ee852da94d160
-
SHA1
f77fa37eaee9b45ae4c4f096e6bb2a5e5142ed96
-
SHA256
62ad3611724efb622f6623e99a3ec80ae6c41af44e906e0b4bd3fe5c9ba6c6c4
-
SHA512
fe2ff9baf475c839404be3ff0c0264088bbab1d08708c242b3322c1bff3c6e3c3a6ad73e183076fa5651fa7c459345c5612c970d178de182237343a11a5039a3
-
SSDEEP
3072:+rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJo:Gz9VxLY7iAVLTBQJlo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{706FBF81-7CD6-11EF-BBD1-D686196AC2C0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433606460" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c30945e310db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000003ddae2a7d5dda35433744a6e3e071a5cd20cd687a5a543162e2fabb1b681d2ae000000000e80000000020000200000003fd2b70f01e9dea2bf33002541297db4bdd0be7a53c3d443f55b4ac0b93d2747200000005ea4400861315dffdee57e8855c91fa9a04619fb3925ddb30007c9739d9d452240000000ffdde19c31cda917041af6431b692d0b97319f7cde3ccd22ab158fe33e85de6e408216873151303f7fc0886182e16af87fa4f2e1805697836deb3f60062bf4fb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2028 iexplore.exe 2028 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2332 2028 iexplore.exe 31 PID 2028 wrote to memory of 2332 2028 iexplore.exe 31 PID 2028 wrote to memory of 2332 2028 iexplore.exe 31 PID 2028 wrote to memory of 2332 2028 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa81e1cfc1a5d4e5422ee852da94d160_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6896d10a0b8844c04a03d8d55e15f6f
SHA1e337c430da55a2add3ac667cea22efa3789528fa
SHA256f5ee2abc6bc1fc63769c9446db2cc0443807e5764379060e9b95c99848021752
SHA512d78c753c95ab426a984c01d4293fcc14fe3d78234de60b3d9124c709096a7b313335a05cd8a35640e8abe686ffd7f3d3210936f88cca3e33cd34b1aab45d85fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f1faa8ca3bcb09be4a8973ef4f7a4c7
SHA1376e7fe059ba1878f32e1fa85e756f1dd1302295
SHA256040ccbb0ecbce5f18bc160eaad7e7527ad36b7c54749a46ddcbe6f1738d453ee
SHA5120c3c7a5df4703b4a3e31cd9b87ab8d58c2446af8d8d1d3c3fc4d6570cf675828888756f9fb017ca4e0a91bd52496259f2f32ecaa9ef075734ee58c4d81bf869f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c9e928f014a7296d7211405ac095b93
SHA1602ea9fa30990f3dc86e939ed0d5f95a95d9d3a9
SHA25649187ffbf5447743394ed786cc61dfb75347059aab74bbbbd60ea43ab7172751
SHA5128ca1830870ed839d33e1f443052e133474ea731ff086d655e677efd1074017862aadb29c8a2d29aff02955c2a3635cb3d56d56bd5390758758e653ccfc1a1f4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5e7bd6b6743192f16854df8e1a8636c
SHA19fc665c385e9212fc7dc9d3ada38029017f8746a
SHA2566d239363fbe289b9b2533fc9701fd8395f278956f1623ddc249ff83f0512e375
SHA512d58bfa16e6b74a8bb4e5fc2d9065cb47e2078f8df378a66fe7b759da2e2881b85e1a023bcd8a1322b58134347a39e9469baa7ab13c37542a2a77b4ea34d419de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5959f2a2b73fc37f1871d5427eb13f040
SHA1bbe9d3d1f66ce751e9b57523519e0f6a5fcbce81
SHA256e292b296dacf5413ee5dd17b600933ee69093cf25e33410a9c42a916885ee8a3
SHA512d2a614d9161fa567bcc65997c9b58f2f84d0271674325688c1eb282a721d6f468a6ddb4c0f1678317a06a7d4466966dacbbfd2282e9d820f7b445ef23a2a90a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573a0f90670132ab29e8cd75501820a2b
SHA1aeee3f5c52b102f9c4dea27331a6e3e241314202
SHA2565754f577fc5a48e15c78f9aa70c6c09d7942ebf72953588d3a216e7c4d675a35
SHA51211793a585c0f5e486a050508e9f024eca1ec95a8deebffb3b22d11c250e367bf3db25e939abad219d56fdb8ae92f73d4ec46ecfe10d499699a9599509b208665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586a260e69caefe389d32107589eacc5a
SHA1a22814446e06b1bf50703a7b1f00e50eff1076d4
SHA25635fcb6bfac5c1216d8d61da868e8d861dac9b1aeddeb0535b137d0fcc58ece5a
SHA512e1c2dca313c91054b547cbcef5c7f6bbd46dfe977aded732e9e2aa1355d336833c3b66e46a8681437b86fd9e38ea6c1f50c2940164008507ef0ee8bc44820f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b9f3ad008f8b6b4fe782be3632bbc9e
SHA174fea1870ae9884178977cacd5362a482d17b4f1
SHA2562b7f86245bb15ed0fb655560300f465ab727efe1a2e54d039d05205559682cc1
SHA512c6e569f0a231802280cc47517c306e36c9e10837c39952b5174b2e7ed7e2a235deb75f4f3966aae09c61c63d86ba506a4a05bda6280c2aff2e97775f7e2cb319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e14cf1aa9a8f4ab8cca30f8c9ccd6e1
SHA1fb5d13d4c451fc6eefc1bcf3d64a2ec65f98e1df
SHA2565eeab4bea870533a4a07cedfa0f15c27e053fd4a652258efd6721ca5b00c11bf
SHA512dd103aaa7fa56243f3c8047da640c153ecc8aac4b6f72bec6523e314d967bf0cd7eef26aa46066fd181019a26227e4a1da275939849c294c77f5574de7b7447e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5905c3b474122c73e43a8cac23faf3d73
SHA11603c863a8895c69712d125d63e40d36b6f027ce
SHA25693c5d9d666697fbbcf8a8dd6254984f1d87bd606badf6c200b72451304a1e1ba
SHA51262a7fc38b684b610f36273c74d2a13c500ad55f88d5e933d690a02a2d331eae6974e52474eaa27e522d40d15c40f334623dfff44e5c8f064e33179b4195ddb93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0c95844db146d25adb024126915a0ce
SHA199f7daa85579c54018b96fb1e93fd6097240bab7
SHA2566472ea65a6ba4fd341cfa246c95f7e33df48eab280a1eb603606c27936d7aff4
SHA512a6e8b501b93f4972f851e4ba5e1a51fbc15f3307d9a00ef8a7e3d12858084b534d7e4c8e6bd9e762fb342546a26ad352c5276007e32d28021af7d37895f33341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3fb0c311e09a3c8d12dd7eecd75635a
SHA19c4ae395365a48690581f289210a0fe09ec6f2b5
SHA256a58dd21dac2eccc059886021bee7c9ee9f17142680a0a36671ac4b32c99bf6f1
SHA512906ffbdfb9dc5cd042b562a498277aa515418740a1fbe515932d5fcfced59057f0f7dc4dc423e6a9fb535debc7edb74dcd90b90ef79de765e18886ab1f40f615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5170fed2831b9f459f54bd17e14519260
SHA11578ef8494e75a24530e0a680fe2ee98f6946942
SHA2560aa186af17394fd7687e68a1591386b21ed3d1b1c759495a64d69dd7b9fdc2b3
SHA51222c23e3a716fd103eab2e2c86203e0bab2374630f264023fdd2bf3ece075984aff0d1189f22cc59b2df52c264f8a0c9a3ff76fd72dfa4203849ce9c64e58e49c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5185a36195d6e4d710133a3b1bea545a4
SHA1ba20b05b87e1fa2753d9dee1d7b7f2d6f084f852
SHA25646b64f8d643aff6aa0e477cfb2b01cf2b0960a7ba7d88535e1abcdc11a381175
SHA512e757740838ae7478f67a8b07b0b8aa07b0ccedb2fcbe463cb9d5c0cbae37f1a4b683924c9f254ba6274f4baeeea66ab8469c3448dbab5a63da02ab2882d74273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53791fcea77cc0d64e747107aa3bc3c95
SHA1e1d907daee67aad060f05e3572562882ce91f052
SHA2564e0674e9b4b8b1e507519565aacb3ee8fdb82e007811394a49190ef9a8ce8e34
SHA512fba2f42e36a31d23cf8c7d5465e8ec7417c3b3a12c2dc37f83d74e44d6c58d007ca859e331dc9e66e714c8b318879a1ec194a7e88e11b7c89025b6b997ed8650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5861ac0987ee123be1194b30f198c23fa
SHA1f20a042f4e2ad9b0def4cc73eda6bdcd922a125d
SHA256e9e8d9708278d1862c2e94c45ce63e74607cac82727d524b755b5dea2580e679
SHA5123875ecf2fa8a07d73747e7969577bffe3d358545d03ba11c6142e9ca49b6b9c122c4666293996072a3ad92bbc958baddb2138c4d0cc4b28c34ba49c3491c53bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560e49b5d1f0ca700e93a865d48b6a614
SHA1bff88e42bf9066701ed708e4feed7913cfcb4f98
SHA256df877966c1e82a9454a996b17ab449887cfdedca05b44e3667b26c4a3f79a11f
SHA5124c343955edbb0549f4f97c8cb307d64b3faafe6425a0dd013bb8d22de8027252aaf2036d71c1201b26d6373b8840e403f08349a7f05befb0aa5a6da0b913ecee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf4c25a232d5b47bbfc4e90be3d55d9b
SHA12f83e28bbb9be2a19cf64aeb163cef7a3da75319
SHA2566356830e5fac4fd2618aa418f0138387068b24ef2d2c55e84ab254b1eb81b707
SHA5127753378920299ef947a99a152a0c9637cc53ffbdb3f529b759f33a5630cd6abb028e011f37318143d96f965a7fb0372653fe5c478da8fc1abfc99e90540e48eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c2b6801db31e2b3cfc2e3ed4ec84b77
SHA1a9bb4700090b376529841a63797dc279ff54cb62
SHA2563be37b0240bc29c47ddaf59789605f89ba9e4d9a8fd0a331872d23d9a7107219
SHA512aacd68a4c58cd6cabfea490d9b69f7ed9bc4635fcf7c57c4362fe2d8eb68c585f862512d79361ffbe698f1072160eea62bec7437b3cad83602632559f4c08056
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b