Analysis
-
max time kernel
137s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 05:30
Static task
static1
Behavioral task
behavioral1
Sample
fde32281d26806f96f417da9e1e3842a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fde32281d26806f96f417da9e1e3842a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fde32281d26806f96f417da9e1e3842a_JaffaCakes118.html
-
Size
49KB
-
MD5
fde32281d26806f96f417da9e1e3842a
-
SHA1
eae69b9ce4287b71def3c47ecad70f45a674c318
-
SHA256
80c12bb56d1837a7bf30807d6e384f94d7028e0fb9ae499724ad95dffbdd88cd
-
SHA512
39e7e506475ac18766c307b9ae7e8c793955687629115ad2b62e88d42a68491bf68b2c197f7d97c90395a1665f5a6c5e2aa36c4dfcfb9d7f766096dbc5ea84b1
-
SSDEEP
384:QQoqtlzJ7IIFZtgpYsbS7InUgMf8suH8AIPuqCX1yb8693TW0IqcsIMtz6gsgtI9:uqT2dyYR7iGEAS6SmSLvOXqT2v
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2068761-7E23-11EF-9319-62CAC36041A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000d5d586d5f25eb5ac7d891db151e575a8e8343c210d41036a4c0a3edf34dca4ea000000000e800000000200002000000091ab24d1fe815d0bcd5cbe89d4cabb9b624668ab17fd0de28a85df448fd24ed020000000ed4bd26dea9c63a0d429dc2e63819b30b85c40a2de35cce64089172fdd724145400000007cc8d617bb14aadda13b4ddd266fc431a5703529bd44fe8980594aef4c477e61a762ecfa1d1b354928f0e8a6c062cecd3b37e2074e002725cdc3306dc5325b1b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433749701" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07546063112db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000004776dd8841e6fe2725639f17d5735960e122921d1cd860b40ec8dcb23aefb1f000000000e8000000002000020000000e8552262387277131fb84e70ce760eb60fc0e3f1a2bce81c48314e75835e405c90000000b09a210fb55e18c9b977264caf0b2e3b86ac9a971b26a3953b0488f2c4aac125e5999540a7e5491a07376322f020672342af48de65ff25819b08f305178812984be042357ed352250bf7c9978bd318653a4afc54cfd926173348ecefb8181a4c43d100712687c72ccae122c65a7a3f2c66c02a11b2340ea2e20f8992550ae9bc4d4bbc101a641ed217bc5706bba3c4a0400000004dfae643146fb54eb73703ac7bdbd4b553f575f28fe8c553bf72c3d559e28e3cb9f0d4ca5e9860412e115e91e7d91f158dcf759068d5f7eefb5c2652db7f1539 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 3052 2108 iexplore.exe 30 PID 2108 wrote to memory of 3052 2108 iexplore.exe 30 PID 2108 wrote to memory of 3052 2108 iexplore.exe 30 PID 2108 wrote to memory of 3052 2108 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fde32281d26806f96f417da9e1e3842a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fb982a8ec1114a52ca2932e57dcffe0
SHA10ce31613d665b9266a59ebec0dd00348b6f4daf5
SHA25629e9621c8dca769ad3b06735d5002a5fdbbc15c190af51956fe315062453d68a
SHA512d39e97c0cfeb84cbaa84de6289dd2b0c3a4247f10fab3714fca5dd20dc333e1fb3c636a767c9c5f5373c9d9e66a8d101713ac468562142326746373b9f84df82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d16578daf1ebca15843a23742da7ca25
SHA1ff3f854c0301e3f0424c5417518185e0ca77af25
SHA256a01e6542c0de45d579bd2d30cf3dd2164a8aa90eeaf682016987fe8d8a649369
SHA51289c5e5797068775ffc5ecc66e8bf0e894096462951503b21d8bc03b32035a2ccdb982f894de262051b2da549c18cd141be278ec1228848a71bdad54efce1a8a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ec12de518b0a5299b7f7e76fac4c196
SHA1ab5e2bcb57d3eed32674d50f1d39cd8945944cc3
SHA2566339be860438701c24b4fb1b2987b69332791b478d754a791f873f76dc87bc82
SHA5121ee4ea7cc55eaa1f06ff9d9a4969f527ddbf1dae5f59c25c0c3c207d55fdbc5318689e927ee74d2217b0fd352cd4237ea76a27d42b8857b81fd2a4e5067ff187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eaa5a69757f559417fb094e3bbe79e9
SHA11f133428dcbdb552c629da1a7411b1a718fac0cf
SHA2568ee7be4868b74834a50e28eea826eea5214877bc56deb0662aebab3c544f9305
SHA512291f560d086c85f935a1f55fc2ee98f2f3dcb7d52ca60595cf3457eed20f8fb261e4f7360ca0c6a7fdfc70d73a80d8e4d492fff6225a98d3f104268b08d35e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582fad7f6aaf4f9ef002e7eb7fee75bf6
SHA16ec4df8a92f35db9d0059dfb4c0ddd06bd8ba6c8
SHA2567d33448aa7462c12c4eaddba84c5e43e0584a2f099d53ec8f089b9977a3b7793
SHA51209f27ec9b9a853cf009630cdc0544f1ebe5746ebb2c2039135443547111b27ba43689471bb9930499201825dc86dd12577338489c84f73c8903dfa41d29c505f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5af948788e617834a3c32008b1dd81e
SHA13673cb3f714d605f4f982be30bd566cf4effb6f3
SHA2566cde9aad65cf7bcd51d937a1673f03a7fa15921a34ecec85b5d7dfb856323a4e
SHA512724a84965e4951a58bf0a53da6f6cb04ec28b39fa8d3b850341697e97d28835c4fb7debd0fb3f04630d8e36251e96f50c69fa99d02078c299dc2b135db95b780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da3fc3f8a9478dba6b0e12a0ecb4fe1d
SHA19d63ad313bb578bb8d36b68fbc4f6b3bd8a6774a
SHA2567fd02dc654195c481c2c723fbb1501b7b5f2bc7c165ebb9cc5ee1e3cf3030bfa
SHA5127b0a986558287aa0fada47698dd2a29f5cf2149dfa98a5c48ba124888416f68b2c657624a3cdfb12b5c5e6af155f6dce1308e09ae00411dcf31cc1228cdcf126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f52ae5c07aedc9cd77d8b8706855d749
SHA1c39a7f6060019876f955ea25e310da4fdcdf33a0
SHA256cfd589bf8fb5526ea0c443bb7167aa13b7c3f13f1eaed1d6d150e97ef90dcd24
SHA5124f54746499781104f9bb41cb5ce5ab989388b06e6f3df2ed0f59dbc837ad7b0603ef41662adcf222cee257657273dc4dd0f82980e6f12dfd3cd4e881220098c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519828771d547d34ea96d0cb1e690d933
SHA11e95a540c40f0b241aabd5881a82d66725e9e813
SHA2569c57d005daded871b57ee59c5e15058fc355e3223163caf9045ad4ade4221d23
SHA512dc3678956a64b33b9aceae3237c04ca742a1af1688ca4fb5ca9b2b5cd127f0d781349375a2b60a30a1f94f98ba19790844cb025c6c1b9d8299907d137acd54a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9478fdf410a706a7557997668c2d16b
SHA12d4e8a342814a819cc760aa463bd1c3b38a05df9
SHA2563a5b5ebbdedea8c348695f36ff0e2657e321465f7acf3ae0373caed11bdbb345
SHA512634c393aeddaecb28bfd8ee1035eb65e289fd0e965d84263293cf3e490be6e95f8fd39a27697db5e4f677f0e933afef892d88e5539d8bffa98f949d37b1885bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df2856312b97ce710cd0f5377012e3e3
SHA182339c62c6dec9861772137bdc86337af869ea69
SHA256b80a234f25822cb22a4a9b0b01ffc60cb44039166817a126730ea7f3eb51f6a4
SHA51255bf829d335cf6eb3a08c7222d5d72e6a6113c15c9b00fff5121156061270605380ec6c6bd4e7e311559e5e2f738f6d74001ff9bfcba8ef0ae8dbb6925acb27a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582391f130659a0a521ab0a35c99b565b
SHA1d581da09ab6c515b8d2b5fce89a144d95692c39a
SHA256f2d769e86734f6de746197627ecdf0d6558ea467bef35d3463135a3450a78949
SHA512bccd18a5e6f7b71a78383e294524e8d416bbc7da9c413c4148e482c332c444fc365eb89ea056556b032ec79af6d89ca4d37f7c0a29117bcdc3c9b178ce6459d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562fd70c5c0c8451ca75eeee49b9e0d74
SHA1790a50c7f6f555ca4681348ecba495b9751be219
SHA256a1e02e8206ff0147fe9933760f65baad05420a833adf8c146280ac1708516e16
SHA512f8977f6549fff7f2d5429e8ce1644aa14f1d70dfe78b62d639c2647374d445939f100d83decaf1de44e239f621a79b03b62d809f5f0a93ddef4f3d49c04a37d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575b01c38e697484c74d5570873a88861
SHA13a626d16ae47e7559feef50876181439781e94c5
SHA25657e9e8ff7a2ede4241f0af784d2a9de1b9d036523194409e04a4d03e2a4ded7c
SHA512dffa0757a1dc3e099e9a34531a8769773ab7ee8f9c81ca1bdf6b90adee6f5657239ae0c01971f9cbd8a3e62cb35597e41538235a9283ba119d1b8b310911fccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c37a8e7cd1165978827b917d3eb2b046
SHA1f9f3013df8dac5545755fcd86a157c788e6a99aa
SHA2568fd36d91a301580c96e64d5d5cb1a45e25a76e7ca12ce10d7b345875cfd43ef9
SHA5121b3038c83233a5012fa7b4d8aecc0ee410d54c63905f682968db90134f055d85bc2b009551e2518c1e67906bedc6619471f32bd8aca9548444ad0afdca5bf0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d878adfe79010e4fee02fef8500652ed
SHA1019a3dee42fcad6c83edcf664d1057e43d277dfd
SHA256199ad9b0a26517d73e79ee3fdcfb5f12849fec9c86368fefa1d2363fd30d3281
SHA512a5b41e827220af8ee3bf2c39c3670e0d60530f870c5810fad7246ff4dd36538fad805f293c0a51bd6347594eef0decdef1df22bc861fe8a28b687f5f50876f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594a542ea7b6534c7662eecb1305bb0d3
SHA1a411d1f9db005424692c4e3fa19573ac594c226a
SHA256381d2dab1270ef6302f59acd06aafdc32306eb50c1c70f25cb5ad975020aed50
SHA51268316796901c55dd4af44ac389bd78885ea426f04632edd34ac0aabdc5731309a34d58d155ab26a60b32888297b4eae60b937b37b17ec2fbfa62c96e022e05dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532c503add8c687503f5561c998acbba7
SHA1e54cdefdb1dc3a6b70f157d95fd752687a46bc33
SHA25656b36d3ce26a8063a752b601f234f7705399b308f6df1017cf593741ae34fe70
SHA51215360bc0502c5a8b4fe5f35216b4e47bb7dfd4d20d819ca5f0b17358fbef4795c024f122f13433ebfded93e1d7e76c275d866ef07eb711129274deadc174d3fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a7b1a055e064834c04ab6d0c9fd963c
SHA1f73c4d6a7a0fa4534d5485f368b3306db572729d
SHA2568b9306af0d0e8f8cf5eeece2405439d4e9bf658078ba87daf0e4052a98a731b1
SHA512726c6cb82c2fef7b38e59c2b94c65fa87afca4a8e8d36a50e5a4e7e3e685a1b5c31702b5b515bb084c0880e97626bccb2712b2ae54fed7c7c0baded469891a22
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b