Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 22:12
Static task
static1
Behavioral task
behavioral1
Sample
5de3bff7d398c66969778c4531d9efc8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5de3bff7d398c66969778c4531d9efc8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5de3bff7d398c66969778c4531d9efc8_JaffaCakes118.html
-
Size
15KB
-
MD5
5de3bff7d398c66969778c4531d9efc8
-
SHA1
2cb6c77fc38129fbff3ec60723d34d79c7ca2153
-
SHA256
f20967fce5e026a361dfd721c66fa8d3b59b20d3edbfe8e3a2d72c32d5dd825a
-
SHA512
61e0d2a34fcf08cb5d181e97467751c71a0d5707895049e26400179526f397d521e89cf3be3c3a5fb1c3d03269fce7ece7ee86d90b3d4aeb7292632cd7861efe
-
SSDEEP
192:FitfU9NatGTzXW4wzStLwGFfHYlerBVqAGJU5tTN+3hu2gLBdAhUYne8o4C:FiypzXW4w+LwqvYcNcAVkxuJfMne8tC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7040a0d428dada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000ed38aed989886663cc5568a298a0af42c8cfbd11bc172edde2ca9c5b52dc7254000000000e8000000002000020000000971b5a308f4d4a958593e85df8dfb38d880eeb6752b3983b487ad42d89aeef5320000000106494e121af455b57b216c341ba45a92b8f5aef35042adce85fcdd4d0e8947940000000a8e2cdf5ed94b83318d8c3e547afcb03f7a2b0abb1fe8da6fa7a5bfd11e8b555ebe346850d09006c8aec1994e45a80ea3439eddf8c4d0e40d3d3c9c84b8eecb8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427589049" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0EFA44F1-461C-11EF-A251-667598992E52} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1512 iexplore.exe 1512 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2412 1512 iexplore.exe 30 PID 1512 wrote to memory of 2412 1512 iexplore.exe 30 PID 1512 wrote to memory of 2412 1512 iexplore.exe 30 PID 1512 wrote to memory of 2412 1512 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5de3bff7d398c66969778c4531d9efc8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1512 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d200ad4f90397d79d1fd7dce5310eb89
SHA1cc5e75f4bd15eb6b0c68aa51f1087c4ba5a20d7f
SHA25620f44aca96ddce5d8a8d7c9c4af06c8ff136ccc8f2208153891434f9ee983cf5
SHA512a03ef19ced93a334301c1ad73ec6941777eb9515f47436445cc0d07e194e2041ad05f04069bb14434ec7a05ff1a6f9b64837b5ae1006563a808ff05473a348c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd784596dcb5d9a50342daded2078f14
SHA165ca6845b6a994a405e88a01eae3f162db8f6ae2
SHA256ec96155f085b9ee4b3788dfa9e475871d74bb29ceeeaddde99af765024216b37
SHA512689f2d5141ba9eaee5e5ec38a1bd874c1bec9f54d48a1fc14948ec25c23cc0099211574ee7366873705c98240aa642cce356fe7210c545587591f13a920fdd30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b5d3d74fcb9f29af09268eeab0fe6cc
SHA1d64b159069898d558ea6e4b9331f1c447ea9f85f
SHA2566a613b11f81b7916ee32b15d44eb042d43b85d07e6898fc392d046a015d3a0f1
SHA5128f44f23dd15741e31a32db4117c322ea4a6b54e0d21ea29773cd9b8e28d29bfb3a6f3aa91c0d7231e00320c67dac28433f9775a382cabb9e347a360c9025291e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532c1b92e97826c11802a6c8ae1712a5e
SHA18bc815a4bbaa715d44f2eaf3c45848a262f69854
SHA256543cb984093d65c7fe3d637e8a6f83039fa6c825a34796444bbaef1447afe889
SHA512b7f8c8576bd69af89d92e36d2444079f4cfe8ef0994e247ce980b0d46866426df0069f0e9f44a6593796909e4340bb269214ae75e25e85669d99d695b8d150c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5137d5c7a2e0dec246a9762dce89f2345
SHA183d415a56d144cd39704573433ba721297c7ad84
SHA2564399e0fd2e7cedce4081a0f05b9b863022866c0cefdf0f3ee34d568255536f2b
SHA5123e8bbc2857c82f44d8421d563addb278aeb124edd8216b2b1a40519a2307beebf093e02a7233496326d9fa48e7c58c9d3f12e80a34a9aaba3b3d402432c438b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da727e45e8942013de7a1b43668c5cf5
SHA1ed92ca2cb7235f8c7530fda055dc323692deb57d
SHA256033ed048da78de14d121854aafb05905ac00c1a33513a45a89a3b5175d1e57a5
SHA5125e270c0ec5dd1ff7d85613355cf006778722e86702a28a2e98c09df66b9ed73d145eb396ef4df6afd5dd308ca03215c2e82db3cfddaa56094f2d7221a7b37495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb3aa267c169d161b10113dbb75f04aa
SHA1ac686e7c96059771cfca7ea5aabe57b7ba9dd687
SHA2566a326bdea03e503bbd0ab6b614beea6960e092e187dfdab61ef7c621a9a03cfd
SHA5125e31440d946e575854b2c404d79c5e318322c96db08be94431ca0fd11d9065acf8b606698ccfe1a5ae165e0810294ce29ab2abdbe80d0215ac31121ef6915f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585271497d604050e13bebd4e4c6783e6
SHA1a4f490e54bb088819d4e219f0c986c8d11b55a9b
SHA2564d65010448c7161a298c26c3184ca3a77b51df4497d54eb9bb11b0eb168417d1
SHA51297e0e2da415b3c50fa684317983785f4c8f82a76045df8a66ed1144ae5f84194c27a1e64266689aa85629a11c0db38d4a74d3f6afc5f8e4b7676ca50b50712e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c01def666bf756cbd7dc0cbd4abf1012
SHA1f7f5e1c4849e85af1e246f426ac2373ffe805d9f
SHA2562688a5cf4eb20b55dae4fd574b1d2d02a283e6c1b9f29bee272cf80cff9b4cc5
SHA5126911900e93dba54ef8bd157900ac3ded97bbe06f73fc01b1e20c98e1bd7fa00ca8455441b4ae924eef25a1c5db1d556a7c45e58185487f92c678669baa3306e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf412f2e8e044aed7dab9557ccf53849
SHA1e005dab0cd0784e3424c05e0b239a3ff5b018648
SHA2568a70c9f6b275eea2c73bdd4cff8d602e633d6f2a2a0c9e7df46bca055883d4b0
SHA51263f0fe0571d453424c515a539c099da13e327cb178c8284f63a5d2a26661cfd2d4758a06b5548861d4a76b11b91d9a207df57b92ebb0840e3f0bff7f0778ab0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f903326f7d823cd3777a890e0b69920b
SHA133c4caec81f2219e33440868b12dc31ff32f7712
SHA256749271ed6f83732599b5393b9c09947c21408af70853e5ea8bed37e2798ebb42
SHA51222e8283b74cd43bd265f408653636c4912e9eb09f90d1e5e7884db16e67759a2455237b1d0dae619759c05be73a97ab344444f718a20f245062401b41358b02f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aa54c169b9fda8b611c133bceeca59a
SHA1118bfba06d398ff89804f450f24520b2304bc0f8
SHA256fa58a11b55ed075098940bbfd7c32f32d8ca45863ee8c22b9fbbebdc6bddd1ae
SHA512629433c99535ff12013d70fb6ebc8cd83fbcd1f711ec4438604456e93202e86864c9facbdbfb3d10dfb335597fe82f908547a587aba6b78f06d4dbae2f532166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb4e5278a0efb1bc8f2add450ca1820f
SHA114b58919fc29444da551c48bf42fcf5f39fc6b2b
SHA256ab31bf33a9122827820cf35962e454680cab3d4e2378d5024b9ef92feb5c810a
SHA51276bac696ec3703f6efa5d0672b973d51dc6848b2ef8b61ac86ae90b994bd83c364e4d1b04b2190aedb50ddd8b650e41a11985930dbe4fbe800f1d8182b40a48a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540123753426287aeffcd9857d46a04d6
SHA1ab8876256d51499d261104d1e08f95a8aaf1d4bb
SHA256f4cd141b45470d0f1c1a1d3253573e8ba96a6db287d520418daafd355308f814
SHA512955cb6d83fa8588353b358d936b6c3875da1c1ca2fde166ec4eb60c47e3fd1c4ccd0080c2c544e40f38bd500388ab2d022bcf8266da3fc4890e6ef1b5f2d7c68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5119e7c73207762f6eb86210e8c5f8e5c
SHA11af66111d92242d7f86bcfad45142c02e600825b
SHA2567bff10baf4619510fc03c63ff47b621af0851c3b8a2849caa6f71e4a508170eb
SHA512861feb10def89c181083eb5b2957c021bfa964c1c26fca1677c903e4b8e6c7b6d6b1450ab6027859bfb92d80cf0939145bbf0b7febf05d81cf1b98227e109c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c34745f6c92fc8490756d36271087000
SHA1e527035a1db81a9560e38a99f2001a3a6323177e
SHA2563bc46abb751bfc98d267430f304424037e750389655abca4d8b4a266f0d4348f
SHA51206eb731e55201e75f8152753e44e384eed240960e087f6bc871a33b9b9b563155bc91d1ec434d329a8feb4144bf7d60573be9a4759c8f81f4d0e4817c8a68472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b8f7dec7339c2bc5344c9a32dfdc575
SHA12a51fffeab7ee3172693666a2bbdd446ef992c81
SHA25696063e83bcf8dc35f4d3a439e9d3d255e3a3db34e14a79ec40fac8f6539c608b
SHA512e5250613438b2f78fcc068ef8c49c9f60ba61998a3fb052200f415f2d20fee88bd22b383447b9abb686ae6b9cecc61ef9a070c766ff924517d2e0c85f8bffc10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c0830fc560b52120920351b89836d2
SHA149912b33e8fa2fc3860281c2bbb38cfcc3e68cf8
SHA2564615959ac3017f3e0d484df8d0ae7a1589349dca0723459b9d46fee174db28d2
SHA512b6d0721dfc3850ce055506418f7a2227010797ba2114f7f48a17e74766c78935a896e347654610b63a78c5d4343dd03c22e7d0a1c03a746893d649b13c26ee4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566842069bc72d4643c41a96fd15f7afd
SHA1af92c8bcfdd998327b737d430e5c16d130d4b1dd
SHA2568d4bfd7f125ebad566437f1a5d1ccb226eb9cb9d913c567b379fe44207142687
SHA512a0be1705fca8e9efbdbcad962f6b4843c251f2313c0afbde93e78fdd85a91c5bdc0e1fb8735c60427459d9797772c07922407e8de418a5778935632cc68892af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a93f8838bff48aba9c168513bee264
SHA184930d72d64654dd71e56dcfb9d00e80e8fe79aa
SHA25601550a28e52d0bff3038922542af800dc31e7e57c8181c45b66cbafb5ef76f51
SHA512f5f0f3c3690258185e7fb9e59f28570f03093062e3969a7283e630fb3252284205af1b01c2eab3e4f188357d145ef2ffbcc76d6ff0fc3bde3a8063d4acde188b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a7536ef072fcf15faf1378cce2a3a5
SHA1a36e0f700093962147217a936408a41507c893c1
SHA2563f25f4549b770a350999bf64d55a8f7971a6e03865c74ace897c0152338502f1
SHA512b761c205c0077d8e42c8efce0b33d06cfdd0d3a95cb60598177cb43bc58ca20093498c46b58721ec5670c4b347d8fe6dba2e4941160b482e1998b1cc5d67a444
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b