Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 16:58
Static task
static1
Behavioral task
behavioral1
Sample
686db6be46a85e30dc0077f26cb42f0a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
686db6be46a85e30dc0077f26cb42f0a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
686db6be46a85e30dc0077f26cb42f0a_JaffaCakes118.html
-
Size
29KB
-
MD5
686db6be46a85e30dc0077f26cb42f0a
-
SHA1
8277b2d1e5fc704eb8f358e143451a9de7f761fb
-
SHA256
30f7e915153c4fad450d72a432b72c264d922bf64850da24c77fbfa18e0e0a3b
-
SHA512
d8fb93adc19764116e1dd186c85f275d5d27a52ac85a5aaafaa2904fc05af8124eb926a2e8973ebebd99b3dec29c98caab49cc8f3dacbecec96bd64466608543
-
SSDEEP
384:iYDZvulXZxRZ68ErRZ68ErRZ68ErRZ68Ei:iYDZvWG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000d7e9673b27219809dadd615721ddf5c361e5aeaeb737147e16009d2ede0b2fd0000000000e80000000020000200000008b2c83b0a492badb126bdef9ff4750c1c242ad4f3eebdbebfd2dbb72e305fcd590000000ce6dc0234cd7269748b577d99e2456b84cb3d25a2b1a8d592efcef99d499155e3737ad6dcfe0829a061b284fe89bf851a45b523102b4e7d7cc38263f1a1d1efa39744949ddf325d25d7b409421bed4f08658d4a06bc2c4862225718f01691e91955d5c6262dc17c616de31c7211e9132203143726ce0932553cbd187f511fca1831d0084a39dc5329ad3ebabe1d72a8640000000d895afaaa6360c1cc9c5e90a36fd351af63391885e1a0561f575fac3995ebd8128517ea2bd9012af39602c8892c886759149128b21f88eba98ed6c755ccfcbc6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000b39280bfc65a57576ad0fde603b9931a80ffba0d969174005698c7043d57514c000000000e8000000002000020000000bab3e86960b7a471e3f4adcf4425393f19af7e6490236e394e55052e3db2502f200000004ed64f39a16357ecd4a5e7253690762b0dcfc433e5d7aae0b45f67f28a6174bb40000000c6d038e353b9f0479d939bfc55a849a9e7ae6d98ec5ee546fff3c7e35183ae27583041714bf4b913eb4ef76314ec1c979f9e71fc2f3082c0701ad2d30b68c6bf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427915774" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00b3ca9c21ddda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C74F2891-4914-11EF-85EE-5AE8573B0ABD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 588 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 588 iexplore.exe 588 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 588 wrote to memory of 2816 588 iexplore.exe 30 PID 588 wrote to memory of 2816 588 iexplore.exe 30 PID 588 wrote to memory of 2816 588 iexplore.exe 30 PID 588 wrote to memory of 2816 588 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\686db6be46a85e30dc0077f26cb42f0a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:588 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5babe85bbc4741eb279ff7f6a7cd62b
SHA142aa055fbf4c30677fc889cb105ba9e420d12ad5
SHA25656e53e12a1b459076b9237102eae3758a257e5fec7c59ff3548103c021f231af
SHA51206fce68ea4772e9dcbd7ff23b4954388e24326dfe4aecf235f14ff45206f667ee08e8472c920fde725b7b24ac00fbf8d6a3a66c4eb620c130e2d550d9dfb34c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53589a395d1a194fafa13e35cd856153c
SHA1aacfc594cf94315c34ce5f1f74789b1d9b3630ad
SHA256e532bbd06ee80746ce6b7b3aae9dc8490893000cc628f2a38eb2115fc76bbab0
SHA512d8a27a4fadd152c7eaf8bbc3a51898b06248c2f005c329e4b93a6949e0e76fa96d9a672ee725f6eafcd50db17c4abc8c7987a9e1b2f10aa854932ebcedc73d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0e0eb639fa24267f86854d23a6d32e
SHA17635b167ec848097f56a90d438b60fc0bbf217b8
SHA2562e4bb41d84ae3dfc9ed086eaacd5cb1a6766c80708dff6d350c8f895f7f6c241
SHA512ef5bf237f068ab6097e25acbbecf9c9ac8458f839735d9cbbd31db01582c1222308db81db995e45d288b86adc108d71933103fc0a1aec1ff9da3dea3494a85b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5011bcd86bbf3197ed1bdf14c92e9edac
SHA11619fc20d111d9fa4c7e86640a8ff026b3709f41
SHA2568abbf459900651abb306f9f145829c1c88a62559785bbb7194925685850fa07d
SHA5120ae6d5e32463cb9d78db846d3b1d310d470067fa3296b3528a0c5d7136dd57fe3d52ed75db09115260265cffb92209936f8028d925a1e770e283a6efff9d10c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aee9a2fd10844d2e05b9f870cc6fe26d
SHA10dbe646c9510942ff06a904f7d3bad7625975e78
SHA256ee9e6f52537ef78429338047e5c859470409150a2193a822e2508878e297a2f8
SHA512d67bd343b0cc9205fb582f3c84ef35c71e461f331dc8c04d685d6cf5ff084936f51ed736477be9659ec70f6407139bf74594f189755cd1fba543549afdd3e62e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500bf54582f4b6e61b175742a5c33f41c
SHA11e1dd2650d837059f8bf25273fb094769d3da602
SHA256645fcbda0fb0a6e32b5ef79c25c853e70f63bef3975c17ecb446d19082ee27f7
SHA512acd4ec36d40adb65466547b2bf189d7fc84c71f91b7e7490d6fcb97abd01d36fee66f4d559310f2061702a0dea4dc0128bbcbf2a816fc4ded7004547b08ee2cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5535e42f4fe05d7269ab6e41781a359fd
SHA17c41af7bf1916eac91d34914c8e275bc8384b357
SHA2566dc5055f3ea9a2a26387b56555c05c3061c21ab03aaac244cfbc2d9ae6d71c9f
SHA51264a57470d6b6198644bc6d4f03a3e3f2828237ab2abb6764670dd21ace0222136701f831ec13e1c513b0cf21e4764a19d0da0e36b38e8c43d8f300a707fbd3e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b76834de5315f084eb9547175386a00
SHA17831c8fad9c81281a7fb73d603be74f39d1d3f23
SHA25688ed69c81ad1224555a305102e78a8e2ce8c3d5af3c1d53d0f8aede64e0a25ad
SHA512d62b754adb59c7484ebd7e5a2804241f0774a44f6935914c292c6b5831ff029886bb87c56aebdcd98c49d19e4e2b523df6cfd653e10e8a212f02f052fd941cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d234be54e2d132b2883719b3e66918ec
SHA16471dababfc825daec4888c00e090840cd77a76a
SHA2560bde1293268b9b559f73800165bc9053af65611af7e9317cd0cb2c1b49e4a23f
SHA51239806ff9e0ba50968a2f0367d9f405835294206cdf45c64f0869b4bdb5823e7a9c4e0791d479333d01b832c5ab236c01117a534ce6dea8898b268f8d1c2cda2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526e338eb1a287a778727eafa4ccf6d59
SHA19292db37d889dbf6d721232880f1c15f2f3138bc
SHA25688725a5c75198cd1e73aa054cbbe4c2a689ca61085a832479c99c7cf52028ab0
SHA5125c8a035a3144885eecfd348fd116b5f081a0b73e212ac04d5adbbb65abf5722ae389d0852197ff937fa351caa2ce6eaa37d6e55c041b04b4ef29e795449a053d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5261ebefb22edf6a05c9000614d8d63da
SHA1faad7a34cb59cdaaf5bf41a5298698b6fb4aef33
SHA2565e0dbf0ee58fdcbf88ede07373b31d811344e1b7a5c9f130f8e9b0ce01295b75
SHA51297106418bc15c9409409884548ad26f799abbe0a3d1425c0e57c69f56da2a01053a7e54fb892e0d45b6adf56ef8a09b1e2d56aafcc67a5b7338608eea8d6d46b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b553c87a8945170704bd94267098e7a
SHA13dbabaacf14a8a6fd16c5b8192cccc2e005f1da2
SHA256ea674dd0cd19c4df7f38afaa42d963f1a64e36a2af283aacb78cebd19d0bd1d5
SHA5124d72619c5bcb83217567043e640d475c43b305521cc858bc4fd69de92be20dc1e10b60621bb7fa3922fbce172d5d0f654c71ef15d3ff8dbf277f84b01f504fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56709ef98af1e50012c6e831029f3b55a
SHA1704c12aad1bd0c030b160d7f78ee04e978785bd4
SHA2569decbbb11269ed9481f29a50c5e73acfb7f84a794366d369711b5d103d5f23ef
SHA512c4a4b494b0a0b780c438dbe04f1ac1957bebccf038c31a39ca4a4922dac262b513e9dbee5b4d60ebd9eb064c1377380e7ae8552402a4289ffce2979f8ed0a70d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57468b0d1050e9a82572d43e80ea488eb
SHA18af9d9b7d959daad83b64efb8fd8a4a4c38f1545
SHA256acb3365e354feacfcae006b4643c5776ba47c75d71332ef168a06c2571459699
SHA5124677f6762fa5eef8876a2bc0799e545c11a91e2b1cd8d12532cd05015f4b735053053aae04707d7556de0ed9d84d2aae9ce7a29a87d989732710cb92cbcf85b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5258e35614fbb807c5913fdf78a281dea
SHA186d3e7278f51469648c5949e3718fc8e89f63da4
SHA256b11762c4026c592324df8c431f6e246c2fbb4f3fcdfd5b47a319759137268756
SHA5129a3b4854fc99efca5e024dd62b4ae6866a8297a649c5c948d7f63c3be856621d1dc7dea50521d08b90211ef26d6fc9a27822bd6b59461c30d63fe59e6e350e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5f935bc28a77acdf57b321681fc9815
SHA1d62ea4a4bb2835a5e30213a8f5205bbfc753116c
SHA256a991a599db669e5514b778a4a25ddbb46f27d014a02b49f2c4b8e333b1f88421
SHA512a00a1e62c8310eef971bd221e80a65f1ece0a32d36f6e94a685b8016be559f5d6a2ed9b8b3760a7f994dc844df1003214432c692732a605c9c5c9124c1d4491f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfcd65d2e80c69c2c1a6b28f2dcacabf
SHA1743fcbaca3ae9760eb53bde7e2769055381075fa
SHA25609f8326645b34461dc2d8a34f17ca3d37f547bb03cb05c128e88a184fc79d618
SHA512111713caa4a9767ad0e5c582e5b7d1aa85cc4ee488005a45a670b47db71290ee3696b8087245e5408afd61cee822d8524e9818dbdd48af661c4eab6576a65888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5814c97cf7b723f531878446b972b9664
SHA1c4ea25092c8a27768eedbf86013e7ddf3fe27cc8
SHA256995abefe38f221a85689969e86a5b4b5e93320f9b74bba963fa8fc7008a13336
SHA512b42549a4b795f6864dd40a2894410266e944dd72cccd9080f7f2eb84e5ac554fca0f1eebd40431fbe2ce4ab6d5e80b9bdac5052e449b84ba378d8dfa053abb0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54337afd5f07e9065811c742b1c8b98de
SHA181f395b390bc98738eb53200998ce38375db1e6e
SHA2569fa6cecd17e206e215c862f168966f8dadff8b1b2b1f4b26e1e371a427c88ab4
SHA5121ce86d1f074f9de300cc7aa35e2f52589d3faa44ad4d235046634cc9c161d2992cfc203c784b482135b9e8c3a23f60a85f6eb0e64fbe73a7cb7b86275442d2df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b