Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 20:58
Static task
static1
Behavioral task
behavioral1
Sample
71359c97d060bae4c2e62a5c6fb530e3_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
71359c97d060bae4c2e62a5c6fb530e3_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
71359c97d060bae4c2e62a5c6fb530e3_JaffaCakes118.html
-
Size
124KB
-
MD5
71359c97d060bae4c2e62a5c6fb530e3
-
SHA1
8e4b20d7ba3973736e7c32bf85c3a74ffe0e8242
-
SHA256
496f72bac7ea774e9cb003a3b712dabe2e5f1682529ec426c592c8d5690db91d
-
SHA512
eabb4304fa175815ccf790e5a5f1a713476920ea35866d43c84101e6b461c562c8e15ac96f21674ed510672be5efe56ac8394bef08277d039878103f3345b6dc
-
SSDEEP
1536:fTbhmI9UW+zSwyVfA+IpXAGA1o9k+i3Vyp:XII9D++LIA/+9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000051c1b5327c009dbded6d5caec8ff783d84646420b4c4f444ff1a29e49b5842b2000000000e80000000020000200000007ea2fec49e435986aeaa23721c61cfcc5647f7a6a67c15ef30a620c22850cf4790000000132c689cb321efcfa56632f1ad00668bb2ff7e133f5864acff8d05394ce3d00b9541c9dafeca33e54d178a3c82ebab110b7efa630c989d6c04516967e215f8ad0c16dab8be3fb45e3e1b37102241eed10d67b118efbbfac6c29464e09eb69893487ff670815f52bebd22f2bb3f2e05e81d790e47f7d147be9240289088f1df7e1636e1742bd4a9b4071fcdfcc23619f1400000006c45327c2f2f48d59ed0b496256fab20c2918206545d14bcff7be76a5a0dd63db7029177a2224323c1698700981062a3792d9f37a852c2a135ce8d09129681d2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e03ad0bad5deda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C78D0831-4AC8-11EF-B552-FA51B03C324C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428103034" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000002bee6a03b3b6964fecd36229fbd5f38b799752cfbfb9c82987e18e2fd9c77bde000000000e8000000002000020000000319b00455ee295ca0010475bd16c7f853d7880867c765b2b49a059e93a37c4dd200000005b475bedf3960332e566ec0a61a98ae84503164d7aaa68acc1af55590fcaa29a400000008b8a82b3ab64508d9396addae98afe4a6603775922a20f12560bd0cb93856bb14a1a603493049fe9c4004afc9abadccadedbff4aee5317f8fa19504afae716f9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2652 iexplore.exe 2652 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2808 2652 iexplore.exe 30 PID 2652 wrote to memory of 2808 2652 iexplore.exe 30 PID 2652 wrote to memory of 2808 2652 iexplore.exe 30 PID 2652 wrote to memory of 2808 2652 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71359c97d060bae4c2e62a5c6fb530e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2908e706222057732ee59c6aa77003a
SHA19caec921d67f5849553ec63e68d6958794d5edac
SHA2566eb2219b8a9794d9c2eb7af86dc30f44da9719cc88b1849d0ec545ef6ff3e077
SHA512af420c8a14089247e761f992458a4f8d1e089b41ac34c330713e689a42eff84af618bb689ea1011de4116eb320874999a1bcc6de4f48ccb66dcebe6e32c78361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c7718c853ca77482ec658c0d8a0f823
SHA1c7c4d93b757cd5db60dbfff6bb31c0e7f57d176e
SHA256ca039a65a073fd781f80f2b7df5e8bbe5e0dda3c110d03436275b470238d01c3
SHA512254082d35c3269788967e319299fb9e06b58fc6122212a4244fbc19fc3f6c1bb0124324f900c72a42d6144b0873684a790ad31102dfbedb35d645d049ef40b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb84cf4f79f0b09099ba1984a6a46fdb
SHA14138d214faab8457538aef2424828b5e03c301ec
SHA256cc38a6e28d239172c480ab3d6b3170b31379308e38054d9059b244d0025a56d0
SHA5125513a98a1d61ba56d8bb722e0c82bd6345871f17afbc1bb67b780e70914967bc824421df544be926bb6f6df3b82ca6b01d22eb8c1a8753bd86cea1bc0d63196d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edc2bca25489856342d08c6f010c0dfe
SHA1fd48a285c79e2f49721aea93d1d931bbd3efa3c5
SHA256e53f8be696ad9bb1173972f7924542dc1e928f67f055e7f56348df9e64ff96fa
SHA5122afa7a90859887254df42739ee5418f13c93b110b6a996b99315f4f387b4deafe982089a91280b8f88a81aa954b84e147fd2cef68638b55fb905c16111b95b84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8ae4e859fb4d366da01e2d5e857ee62
SHA1b2e7014a6f6c399f15f69fc3e28beff21a33f462
SHA25696fab9af806d2ad351c81d1c172bef796600c05d8c85099e8ece43be389c5782
SHA51254b8e7ebf73b7b7c3a2498ab0ba252b37439febe51564bcabd9dae14bc937f87aa91672730ac9656623d74158fa04fb67be60522b1978176472cdedbed70b3d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547ec9e37a5992a178779e7a778e256b3
SHA1df25320ff336072955a46aca3400657698461a31
SHA2568b56b6598e56155b39fbcdd5ae0bfa0b8bfe1442a9b10311ff6ebf06be21b2e4
SHA512d005f2b5a40f729573f3c1d0d74dfd797b21e69ae897bdb74f8c444a74c4442425615da76aa0befc306278bd73cff1fe4b8444199f88b7b2cf19d2eab927d672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a9e93e2a265e5b04001a80e40067a7
SHA1a42ba8c4c1a6c0b818ef19eecd800f8439d304a7
SHA256472e6124096a88996f25b42dc4d97786dc3f830862aed8f0eab51443f430afb6
SHA5129196e020ff9a1e635b7ac7eafb24ad50e42c6e55083da89d35c51be6731c92b061337a684a410ac677e4e5f922b72e08635b971682fda5cce3c13404718778c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd21d74f02468d3e75d0529a24060d68
SHA1873eb275b37ed49d617ec52841c387affefc9f40
SHA256cb2910ed856bb86ef539a9006bdb7ae3624c113ad565fe672ab6e3de13d319e4
SHA512e39d8a5fff1678301ebaa274fab61a2bf93bb47855098b4da59dcd2b7713d3dcab0d6894f76f65c5d3d90947c9330180af3c8567b2132cfe160f02ef501beab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52793ccca1a9ef6986ad3573b9d7e33cd
SHA1585698acd7da6e09b6689cc40981bba5150792bc
SHA256f23886d6883fe3b43bcdb6d6203129ac71f22a521962d3eac5ccc9cfb7b9136d
SHA5126ad23c9db787d2302411bd97c9ad8394f24d37f27b5c10ec56f355d25850739c6c51e27f34d1618a8c51ace1b778cb519fa6dbd971ce71741d24061e86f6a37a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51914b8569826c02dac6c11011eb3cccb
SHA13e6ea134ab3206c52d79b6b788e7cdb954400a02
SHA256c51bb65173bfa9f18b93bc6e15f7a473b4fc88fd0e34238ee1f2ff2b532084c7
SHA512ad13512cce826fc98218bf65d5cb480486aeedf4984ac359836f52b72a025f9402fdfb6786ad6f2b6f89aea31bb947cfa0aac12e45f81fabba3e2f74a8238016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f74970d9efd83bdd4771402d484c2ca0
SHA1e298f1daa484c5377009546c64df2222b5f08310
SHA25679b92aaeeaa0443334d8f3158027762b493affe24589a2e988af180a2c67b9aa
SHA512429d88fcfba5da93ee6f548f9055a944e6f24a027efa11d9dc8ead91d6505dfdd9e0538140a705aadc9ae880e3d17964ad67642a6f9357072aa3e009c7631563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d80b690241abdfe651bdaa10b98366a1
SHA19b0acc62246950f68000e361430feb45f789bcb5
SHA25605e137f9657d4602ec27b6d8a3417ebda5220c4357e45fc0938b3a072de86310
SHA5120fa7eb78a5065200dc681c0ddd116d0f2fbf2229f8b84b9175f59b7a3259de8cc892b24af53d303c8782bdff14e265540859bf44a67d7ddcefc223d0084c0c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b18bf4665758bdfb2a72ce3d6335824
SHA186fbcbcb2fd1cd509785f49b5cca444b588abe9a
SHA256df883a20f9ee15e47399f3822a48a68a06d72d50f7a8c02d2eccd5308e6b8726
SHA512dc3618ef0e00ee31a8db37f10016c2ba9ffc4bc5487711dc82729b1896e2af1e48f19e7a11809dcc8aae92843c066411b8119649d9b7f16e962aba62318c6e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509a0680567efda4c627259bb1782719c
SHA12adf278d2e641edeaac1efce24ab9ff3b6c2b72c
SHA2560b9b7716a928cb4612fb5d480adfc0832469ce5a18549cc9b781fffaa2352b71
SHA51263bbd27a6831f30935bac3b51b07b392b169422ca10a07642947596fd59e2d717be2ee4944d69396b80330abd30205a5001388f497b1b8d0b460d954223d0342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfbed52de8496910c64ff0e848beb816
SHA1f7524c5e0effa26075ea0061cab63822f7a022e6
SHA256ba782d47a0f031b98f7a7c205882b4f8742c4732a444863436808e53e21a2410
SHA51265b8efd674358d9b16ef624c1d815b9d466d4ffc76bb9feb69665d7abeb0d64938b81ab4ff3e571562775d440b16d7085d60638df5d22d682088bbce605e476c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b3049e0a9016a9816fcbb3fa394f500
SHA10c6b5ac4cf74e461e6c4951161fe5e29a076aa9b
SHA256f2acbc71a15a3a621e2e6f2aa098d49c5d5ca67f330ce64fbcc559f0c4cfaeb6
SHA5121d0e1314e3c4333a900c945d0d25bfafeb6c02166ca901b8db462925ece157d144f5f3747d45f18a1b1e220b8e612bf46b266ad629da975e95ec95b7e288609f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4bc8ec16ce72cfbf83280e285d5293b
SHA143e4a6f3269b6e6a77880d36ee8513a6be8c4769
SHA2567621e665eed3894100cc88bf1ec4b70678d63b201a81faa8493d9d1afa9a326a
SHA512e36ecd799b91715462fa65a6b3d1e9bacba09cd014bc534034d703f540a045702f16d5b10d82dce378a78b1e90457deb704655ba551c2973ef6c491726f30fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52051a1241f976600ca3e99bed9b7e7d6
SHA1c43afddc41cdec70db62796b81ba73badc6abcbe
SHA256b1bcab759e816ed2cd3cc2e2c2cd47e42f30daf9ef91752d13a3502139a5936c
SHA512451bf017c73ab2eab900b4099f129266a38c6eb9d25f501b9f2dcc46610d730bb4767c934beefee009a0566d5fdf8388c168a1f23adacf3da9f8b4982d1db787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be97fcb6882d77d5c3f0e0e2dec2a5f1
SHA15041fc13787b61134788cdd872c4159d46621a38
SHA256687a4d1c5024af0ea1c73ff067343e3672469b895e504d3a7d9dc3b0b0364b73
SHA512aadbafab9d93198ef510a1a94b8162d6d35f38617b04fc734305826a0edcc6bc5f10c29b7d6f5cab8c480159fbe12aff9b9d7e4e61c63b35f3bff89fc5bfe012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f16e9b914539300001b5c196f8d5a844
SHA16f943ce3bad77ea7961643bd81d8b2e1c1038863
SHA2567e185515690404a4aeb16227d409bef84fc480de5638def33ba2a95ad8d4b3d0
SHA512133b4c4515f0b62cb6761741f5552374e16eab73a26ea004af8661ce95d25cb601d335b2ff30a99a6b71607386b2bfebe1e1579cf6064c5ba78936e29b9e5884
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b