Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
427504cf19e580e10ffea8d0190deb60_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
427504cf19e580e10ffea8d0190deb60_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
427504cf19e580e10ffea8d0190deb60_JaffaCakes118.html
-
Size
9KB
-
MD5
427504cf19e580e10ffea8d0190deb60
-
SHA1
e38206f4181b151a5bd93925c710dcf029a1d465
-
SHA256
a4925fc6979b6e93cb66b12f5b87ec546b6bf0d787228016ce7159a01d803d9d
-
SHA512
70b76712ac449519a0f4e80a703e8bb69162c5128540768f9f999a2de0d87a7e77a5660ce728fc2f7fc517ebc439053c023eeb29a99ad14257b121763046d299
-
SSDEEP
192:2YWw/g7UnlGlyoHlZlxBpBIkstYCtXAX1XRX2XDXI:PWYg78I4oH73n+ACtwlBmzY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000288c570f08dd6c4face1c3ffce3445e30000000002000000000010660000000100002000000070950b70809fc3049c83c16da3cbc511365aaa2fce0cbd5353c5d071df166807000000000e8000000002000020000000f75ce6590871e043f0bcf35ee7d49c2a7c6ee074ed5679aab664e64426c9525f900000008444dd5e71f80bfa49ff47eda370992a63f3be5cb6b58c5b715263be04d358a9d304f88e5640e7805a0c05724f4d34ab1daeba8158e9c3e8b785bbc287b410917dcf91aa7c4e9fcb155042a138c93ac74d5316dbd7ebc1b86f56afd5731890965e317179aa3c198f84580fdb9640ccbdaa01dcb1071a31ca90699cb496d988278f6234f2520dd89ba332241f0627657940000000e94213a74cd38ab18f3bec39e9e2d05f6b6a8af1d7261c3f177da99861495de6dc85889e2c894ced62e76fc4990683748e04d94dc5e127fb17454cdc976fd9fa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0a9b0c6381edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000288c570f08dd6c4face1c3ffce3445e300000000020000000000106600000001000020000000a6bd726243a5da6d5c4c60961e05573b5106e5646f68e14025d0b0ba8b0793e6000000000e8000000002000020000000b06150a7f83520e66fccdaec529f48671e49d0e694100f169d1f7ae5d11dedb320000000a2d02d741134c080ebe373951f68d86e50eb94566387ee3fa53442506cab2e9840000000d7936b935ef0490858499dadfda1c2405ed7e6d9b12bc76fb124f51c71a3c6c232a1e104396f2d3b5302cfea9e68e9cf2f30982df41ad7d2d09b2c035fc14d6a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F228B6A1-8A2B-11EF-A7C8-6EB28AAB65BF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435072550" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1452 iexplore.exe 1452 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1452 wrote to memory of 2376 1452 iexplore.exe 30 PID 1452 wrote to memory of 2376 1452 iexplore.exe 30 PID 1452 wrote to memory of 2376 1452 iexplore.exe 30 PID 1452 wrote to memory of 2376 1452 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\427504cf19e580e10ffea8d0190deb60_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1452 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5328667b1bba5f306e0b66e32a8d0996c
SHA16be64a5c489a3de3d31059c48ac4769cbe938432
SHA256a2cb6daa56197f67f5a71c10874d6a04e484d6492890f2f164a88b175a7bde16
SHA5129f325b0698c91ff3479e4025a1dafa263291434d73d7662d5e65e200b0eea473115341baac4b29e380f2709bf15282ef3cfb2583bd132747d1188ee719c7572e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591929a18f1fb7f7ae62daa50f51fddc2
SHA15bbd006c36d4537520718841ca2c6d0334a01f3d
SHA2565feef822b44e032460867b11e08b8c415140cf55fa9ff73ffcb08f4e02ac8972
SHA5125198496219d7d4c579a548052dc59c1d62881166d9b7beb6a6f42892db65453e1e8a4599c50cc27f4a07401f9e4ae1b453638401cf8569e031f2706c40fc1d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc6faab59c4ee93a0a0c8a9ebc04bad3
SHA1154457599393a641e092554184131d5085e140bb
SHA256df0ee77b1e6770da99c41ae5c80639339318c121e9cf69c1d00f3d5356a89bb4
SHA5125e2a7c173659f9f9b854ee1cdab746ce4e1f03ac5eaf24330f6a495118f5957326052e97487900edc860cdcc66125e3f00c71e1fb814404967a4b5a61de7e3a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ac477d79922102c653191c6f6ee266d
SHA1b9783097443baf73bcef8ab7fe81e5f64e588e86
SHA2569c3861b521ff4c60772bf26cacaf87d95576241bbad5ad1b202fe23f69583eda
SHA512a03bfece8476b051437c6c74f085d258ee172c02f95a1fd90f24093108f4b80e333762d0f730a708eefba51bc0e5bfa166a5c040b148eb12dec4ff0679b76a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be0ae0462a9716e5ce21fd1b1ed29b22
SHA17170f9b9237a7481b562bf8a2214d1d9cb5fd8fd
SHA2562cc0420834ef12d00125b3a185090a5d1b920c71f807d5817023ce9f613537ef
SHA51230788979d33f70b143879b424716804c5f0036103951c56cf8ec8404f4966e354fa437423fec84ad4e93bcf2e1ca11b363a37ea8dc9360cc2a9302701a503273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef3e23d2b02111355a9e7da11f3ca2e6
SHA1b4a5adbfc7e09175ecd023fdfd03a798142517ad
SHA2565ba037de089e4dae81ee366b0c94b8cced2f6d9cb7dc7520a138eea1ac9f9683
SHA5124558b61c5dfa1987ac657504ecfa475970d9826c857781fa1b25d5668afe1a35f4b8e092a5b81dc89d2ff1a77ce57e43777074ace3876941826eff25d26f2e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584f67ad7216d7ec37a03efc64a977222
SHA18e115591cb1a750371b6d4735dd341ae03140753
SHA2561a532efbc1b99c020cdc04f67962b7742487eda0de1cab8bf86f63ee1eb9961c
SHA5126209739a7637d3f32885b9e243e69a80b0ed36d92a07956f10188f858f2945dcfba3b2c7d136f82da59ea9ad1d8219c5fc030fb32bad3f4f7c4f4995079d72f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539d3a410bcaea040cf447f027b9aa5a9
SHA1d72ae63a5538c17504c7566b597ff49fee83e3cd
SHA256f2729e023c0b965310416a0df0db915f8d21c1979cb0119f0e9d4b512efa1973
SHA5124c4b4fbce38b24237ca552734f1c1bb4c8f81e41fd616aef1535a193d74ef26fccccdd5138d6c6e264d78bb363c7468984ce1a1b284dd8602519483e17cebcec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b54d0389b75b8a531f4561edbbf971f2
SHA149f835dc43eaae4cbd89d78fdabd72bed2910837
SHA2568420b8fdb87d77d63545cc741bdd07f4b96347abcb0179158563e97a80ea2532
SHA5124ddb5245edbc08e3fffbbd9e05d367c25986f992afdd27708d20f3a5affbd56801d4ab5a56fcf540e5f00931d1ef7ae2e91d4d6876eaf7a614d5f302e6acabaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ddc6f8f4ae1bcd5e6e3949b0eddc0b
SHA1f92f23ee4727277eefd315980e96b074f191a660
SHA2565957733bf3057022fa48728b22e7d31a7fd7b3b6ffba8411d2464b297b548c60
SHA51232e86168065dd998a44c2cc6013f97ef79ec57b8efa83efcef8e65a42a3eb1c3fb302334d6adce50a7dd9f384ad82de7c409bd99c89d50d4a9161ef55f149161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7c027da6081d869d6369ac4402a1d3f
SHA1c4476d946d8805ce930d19edc1e3cc2d0730cb95
SHA256f754dde4bec8e00735b10b68087ee2c30c4c804e3dfd6f03c6ab6a4b7615cf4e
SHA5127069a24bfb67f53fffcb13ba9a495a0a1aabc14a39882806f6d3c2042140ecd0107b63b86ca67fd444aa6f79593a98324bd749b608441804904b0e0f3badd9ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f7e4261265ef30c6b79b2ab1bf620d4
SHA1509d4aad9fa8b23360c0190307f0887c4e095926
SHA2567e2ef50dccaae56033f2348240e821b9b6a51916b5b0c390c6847cee15f44c9c
SHA512d54f89f828cbc41a3ea20f17be8364165f29380137ea22740e5cb064ad61ed8e716876db51e49ffbc4bf00953706f3d067d64496b329c7ea30456c4870c0e729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505da61c53782a977fc837af00e50e8f8
SHA10a1f21d96370368eb01b1e081c16080795c12de0
SHA25611232f8e99e52340085aafba67335133d2351868e66497f3c0be2be80fbc7452
SHA512467613f9f49d62327b0b8539bb2549aa3d8fb4d4851da4ab25dd4e810a4e814f4d0f2204235b908286b4ccc41c5a22d7544d1e288efb0fa2bfe31301e20b16c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6314ea20fba33956b93bf9ce19b12b1
SHA1739fa7d2b4f596a78db9b42f203619917a8e90c8
SHA256cdbfd627f6df5d4dd624d382b59062d3a1d3ec1b084faf8818b1f3313c9da8e6
SHA512df74d2aee96bc348e1af6ee06d43ebe4d230079264837e14893e455e390f26b6fd99bf927fa55407b8f5a7c2aeb482ff45a145406ea5bf98139ca223faf9b2d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e46cd2ebccd569d883df62a7f14a604
SHA15b7c125411a1c8b48af86d113ffa6cc9fa19ca4f
SHA2565348ede5205e8e26d1db7834d0dda534af7b8032db671fc82e65aa0eef056941
SHA5128af55b771eac4197469e05e2c81648dbd54f2d19eba239f7890cf7ba33ec5805d49464c52282e600fb0e4e5645a4aeaf1cf42b0b9c53bfe5ead6543adfea7364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f812113351d325e49674b6212d39f2bd
SHA17e257e35b0bebc3ae7db18eccc573e957486e3e9
SHA25668e143991afbc47069e620dfa601fdca558cb59b028f56f33d32ea8d3591f230
SHA51282b029280ef8d091db30d6c9be4a42db2522a7f827b24111af58c11cb4fb10e48af1a7e1fd353e7eb99a9694789c1b0f53c43cf09cb1f1c6b35eec7e54431d02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2b4bd39b2dde8b87893f3176b335a85
SHA1ffaa448f2541d50dd540a74542ce1b93dd3b7a29
SHA256f1f6e36203bf9f3252063f715a7c4af23da3feeeca61b87c2ac1bb4dced4efdc
SHA512796018a09a04195b2d13ec745492dc6419064d35de481d621aca6ac5c7f0e2a5b444114d478dd11665c4ba66947f2c99b363fc7da25f9be527d2d6e8fd020fa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c3c7fe6d1e7794de7341416084230d1
SHA1fe729d724dd08d99f4f63fa02215315500fadfca
SHA256991bffe28c171986a6a3d478b6c6d2800eeabe2153320053e1cd6dba2710b9a8
SHA5126c9701866091bade074c44ac99b88c6ece8fd33d49a4f3ee12d0f9a4835dca7d81f2599d339fa160e40e40759ca6e332d10860877cf4716ebdb216e61f226736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58099303a5169643fcc44639df53485ce
SHA1df2971ca774a034c30bbd0c33aea5680d1be574a
SHA256858f0fdee2a5c7c5f7ca1daa3e9c08657b26c715fb8619f78862f32b06f20a01
SHA51208c03d283c444fad18537ee1d988e8345b0fed3e3e7b9b81d8d7411fb8e376f131c8d5f54a1f37ec5a540078c08933fabccafc89f4987cfcc86ce7c06213f083
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b