Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
7892ccd9aef6980e47d54867a84c6ca4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7892ccd9aef6980e47d54867a84c6ca4_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7892ccd9aef6980e47d54867a84c6ca4_JaffaCakes118.html
-
Size
58KB
-
MD5
7892ccd9aef6980e47d54867a84c6ca4
-
SHA1
63c6afa9761d1ac5352dc77fab1793f8ac59c3cc
-
SHA256
ca3f810330c087b1ca2987f1d73bde754e01c30141797ef59cbdef680a964f54
-
SHA512
ef43fedbfb6ff1b17e9e3bfe32f5e960bc9d106fed21aab0d24abf477316320fa2693abd20a76352cd66e35f49b3ade23989c51bbbef413a918fb082aa804b85
-
SSDEEP
1536:gQZBCCOdvUpl6bqYEc0OWbcTepRY38Q0OZ0IxCYz6KrV8hMPY88TNurs811mfGfP:gk2hUpl6bqYEc0OWbcTepRY38Q0OZ0I/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46D13771-4E60-11EF-85CF-667598992E52} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0570e1e6de2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000e2bfeeb6c7614081bf7ceae0c3b18db951a903cdd66e3a816d26cb8453bdbf0b000000000e8000000002000020000000bf81c142f7bcc192c92bdd4057ce18971148999f5d54f80028353ced4eb8116290000000bb3a35085e1e2498e3532c976bde2a479434548aec866bae2acc834e9757a03bd3507a4ed1d0df615d545126a9be13cd3df7e9074cbcda51cc183988c8c9cc48daedad490cd110eb33c5f1484989eef1a31f5aef985bb4b97a43ef007919b40d2470d8227bb112d6b70119ad4af22c0be38102b175f881fcb4ae9778fb6f644d9a422edae60fbf790b2b03a80f2d554e40000000e9edd9d7f7370feeffac44f7acc52a277839d0f8a56e81824262d3cdadf16e26ad51f9c638c5d76622cf0ccec9d318819209cdbf43e2f6e00ab10908b2a6afdd iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428497956" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000440807620cf44a398873b4cf7d76a3fd24cfc8db981803fa5907ba6363780dc0000000000e80000000020000200000002e8219135828c9daf7eee07d2ede68f86365ced7c14c70ddd326437f7e2e96452000000044dc9c6791731cdf636f7d97d0696a3555a39bdcea97d0cd90008c0ee9bb3106400000008a3d40490b189c8d36931e11b4d9cefe1878cb1e4cfa0801057a0d54701783e8cbecb9aec93dc2d851f689ae9321d6148545f2cbd4be9a144239e940b2cb36e0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 1256 IEXPLORE.EXE 1256 IEXPLORE.EXE 1256 IEXPLORE.EXE 1256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 1256 2460 iexplore.exe 31 PID 2460 wrote to memory of 1256 2460 iexplore.exe 31 PID 2460 wrote to memory of 1256 2460 iexplore.exe 31 PID 2460 wrote to memory of 1256 2460 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7892ccd9aef6980e47d54867a84c6ca4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53470ac685cfbd2ef9104808bb72bccd2
SHA13a20109c54fe051e0330677b8bbfccce652f19e5
SHA25656f0fd2c2de111816292181cb83a141558eabe92f435eccb7e09974ce85012f3
SHA5125c4c7ee2acdb8a0e32a4afe763820f03f9e0a46b5ff9fdc30b8cb299f12562335b3812038b338df926a6a2e55157a431a756c6043b47f9c05f3da4b05901a171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8074a5c0054dbb4a1773612dbbf06bb
SHA16e18901476dcc638dab3ee801770f093e8ed98bd
SHA2562b684357a16c179a1d296ba35dac4809cb38431c3ab4e2bda0f34dace7078989
SHA5121b3e2996b599be2186f049fb8955833c678b29fe0efd94028c096a1560d951b644b7fee6cdbd37c978c850a898aec274b368af4d345c866b83f3820f2ff92d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca40e2718a56643f8d24fb04ea4f30db
SHA170ae9e3717fe15acf9ea3961f710187d7828f939
SHA25684941cc6fd02a18576d4580fc74cb9313c368a6f42a9748f7477c5290eb7d561
SHA512f3d29836389a34ba74327889867f8ac9d648146ea71188f95651bf92bbc876f26d17fc624d7c48f05143dffb72f43a947edb5f34654099a00b160e24982156b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ba20b96c99a06b618b269837ef61bdf
SHA1c74c5d35da23f8b3a027bda673cb295ce82bf551
SHA2562917afd1194e0317bdb758515dae932ad05a7196b7d8216ade0232f91c265914
SHA512a5045ddce2db110e26a355ccd2442b005390f36e61a071ece68f21e499c181863eb19c56e47a2d73591b4bb6c90d492a245216a16c252ff68fefd94fb4124340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4ba405216530624cb628a336395be43
SHA1721f118e83f53270771308ddab9a61c41db456d3
SHA2565500583b315edf04fe2e9d244a716a04cb0f74bcf4c3c8af1c913c828695d743
SHA512372087c511bb332d1c7f07aca82e29988d45c9112360961266b92a490cfbe0d40da0101dcb1601c967d543ab633cc7600861096a86cba619275c9cfa8579064c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d283ab1761f152da6e4e4c208e18f8a9
SHA1984f210faa1dedc760fe6a6c7192c56584db8c27
SHA2564b03dade2066a00e9b96a366fbc49ea4c16c19711d3be9dd44ac0d47003f0521
SHA51244b705c55652f3220e0bf8c970c978d0167572d430b67a4d883bd493beaf56852d731f6a33d31d67565cc7a36a8f1a5c5187fe78dc80e6c003390e0468a920a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5e59be4cbce7edea89649bb5fb20b99
SHA14c5a468dab421ae4576c0568b9e9559e5ef090ca
SHA2568800754b6213220465b3974025b57636a7023501c0159edaeefe9734f4d3b463
SHA51225ec657aea10f8e2e32202f2e9ce183583c32646ff57b2353473bae3b992b1bd03e5135d8f973752e55004862cc98d639aa06e836356b45d99a833e60417553e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a5655c1ee39702e9fd3bc285b364f7d
SHA179a76f2f4252c33878fe2e189d29c8ed5f9c289a
SHA256bf506b04251b4b50ff21d3cae419ab028a2c06bc7a814f31b3037d65470947c3
SHA5123f5cbf135207f17e010807e21f5e06f8947475b0be7e399e9c14b417f7318d22ca97030f0614d688a074baddc5982b45b46d4b11147fe3400cfcdeff86a8de88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dc06135f8aa4bfc6effd363a95ad2fc
SHA10f5c3f1933f4a29c143557e17ca2b371c7493482
SHA2569c2ee69e61f7f5ab221c968e17b694b795f3fe6a85fb970d524a67fe78dd1848
SHA512b8cbdc5bdfc056a3a52178fbd999932ca8a2eb8715546c8ecef7e080579f0009332a54abc0ad4f4bf23d8ce4dbd4d6219dc20572fc3a2ca30ca775a0febe72e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5972e3c5adcb79956224dfe91227c7a30
SHA141b227b5d09b270e04baef49cffba5baf2c747ed
SHA2568fcfcd8bba801a987487f62acdffcdef824d1d53381ec7c74b078535c3b2dda7
SHA512eae8aade6ba2e7675928a0de6304c63e70fb158d723d1477c4d3585bcdce20db94b7137e39f44e955d3882b95a890740784b6aac9bef5a13021d3db2558ef979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5311da55235185210275a7583aedd037b
SHA194b5b92db5b8a420b7ecb9fc93c5b650ae4c672b
SHA2562add44da23c600448556a9af628c0b16a8273af835e594d538aae0c595ce39c8
SHA5122bdcf46c21408a9721b7f9ca8f7cbda5fd811040fae7879d48fddac4ea21c1c3c75069191237bc2de11b8018a37aa60f881854a8bf3584e9645681f3973fd22e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5690edeef47d082f5e1c462749f3895f0
SHA1e1bbd5b165f8de028c444bf6696093ea65e49d45
SHA256dcb537ede63c214fdb8626262f838b2ff35659fd27446a3148803c5f572764f8
SHA5123ef57b152ff03f21f9313e9c8eee74e5f6bd1b3c07fc2248ac7174863d93b5e9962de2b367e040f017c1d2421d2855bd41874c4474bade225daf815549457451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529e87837e8114bd7706f9cfbeb20da09
SHA1ec2f9dcd7a7c52f0bac8e8bb6dc0876647c3d736
SHA2569083e9d55bcf54166fb84c421c9479d564d7068828d8caa7f53e43a22cf6fe01
SHA512ad2658f6eb5bb1b024c28855bb3dbd6dac9253b6e842f88a8c68a894a22445ba31654dcef5ed08397504b6501673307301e791e0287baa53288120ba14f5331c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517aefa995f3f6cc4c3d35ae67f5920eb
SHA106ca6e94e1d99e56b52ba9968e38d8e4c9b8e039
SHA256aa1bb4eb796e8675c125ffb49ca6d5cd2b464c8166a88be4a409d2b737230833
SHA512f443b44011ca85a4172596aa3d0ccee60ac6caf37f38de59f060c93c6bc74b6724ed230ccf03af99e180ea5dfb6bc2d9865e68fc2bf6c7e374030ec13cfdd500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514e5ff3fc6928870150fbf738835b4d9
SHA175d5462261ded6106cbc1c9ad783267b77c0d2a7
SHA2562f04580550842833f0ade4bf86bfe41ba65e4a8326991c18723b4062f1ff0c28
SHA5128d2351d8c137435ac3666dc9b03fa99d8ea03a8a65c21bc08df1a0637ba177de69851c039d2c25cc1d704c8ecd209c8ccdafb7348da8df33f42740c83ef843c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5285fc3f150ae8a8485793e88b4088f92
SHA1dba1fa0563a84ff5b33b4762de447e7359033eb5
SHA2566f22d0da6c6d46e99ffe827e874d956b11a7b5bbd8c6910a174c762edca716e7
SHA51294f23dbe468e657aff7692ef030dd6488ab4a8fc24b8e4cb8c60ab77caa0072a60d7deafd9909d4258aa6fedeeb6a450fd1e9e51c6769923d73b75986f550489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a529a09408d5e74c2eb5e3b0b9edda6
SHA1fb3c967dd008a12c8ce600b723fd2118ce9d064a
SHA2562c7883fdbe66447c41be65c00103f2efcd45db4faf5c95381c14203e2b67d021
SHA5127afdae4938476ed166b85d7ceb2417631c18887c0f677c242afe1c7a6b7ea7d440c54d6217be2b8043f407a9da3e64f4c8a3252b487574a591e357bd5115375e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb6cf9605d2fe0768b79fe6e0280232d
SHA10d988a700997510f345c83c9eaf088e256843105
SHA256cf05052c4a09d3a1b1fae4bdea65b1387c0695a3971b68fed78bb42f4b900f34
SHA512667855a0bf2c5c5620a5272200a21459a79029aa6ba3a4b4e6bd449c1fe7b3528fe4131e6224aba7180fe79c4310df6922b447dfcb01da1707b9fc90e26018cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c4d763f591712504040f791c4a3cc1
SHA1c9e0137d6c2670289e9c5259a69dc79c1e63cd25
SHA256cf36a9452dd9831a49adc04ceffe17f4978bc2e26b5638767fa672c66a7653c2
SHA51249291813f5387b828bc7d8b59766a03fc350ff3920246e75a39b40c8651cc93041d4c1496035565f643d28b5daae122f8786ebb974df862ff40afa5de305f1c8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b