Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 01:53
Static task
static1
Behavioral task
behavioral1
Sample
c20cce5987c01446d15a63f98e8e96e4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c20cce5987c01446d15a63f98e8e96e4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c20cce5987c01446d15a63f98e8e96e4_JaffaCakes118.html
-
Size
29KB
-
MD5
c20cce5987c01446d15a63f98e8e96e4
-
SHA1
6d62d13e0ca453a5e4e15dc1bd31d49543b70c22
-
SHA256
71305bc64d6b26ea61693f525e11f4fb99f9724a34a7803417745879d98a21d9
-
SHA512
4a4c5400a8ef5deed4adcf0192ad45cff1569fba10147597041555c3a1e4c49ca3e95dbf4ddb4a400965fa5175169717e3affe8205b3d4d739362c63cac910b1
-
SSDEEP
384:hzZ/r6oCZ85yFZV+1ZkkJ1iq7A5V/xVk/7G18IRqrqSxC23cCZG5ebIOy4KNEH62:2oBAYf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD28F471-634D-11EF-B74C-7EBFE1D0DDB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000a065748e249a126d00937d0ad5d176d7bf05016ad456b45325da078c53744ec2000000000e80000000020000200000005c624cee42867ed5fc80082f809845ed30fc19c913dcd08bf5eeca2cafde831020000000bd0171c05fc5bef8efb6754b829b4c9900e1394906fb6c2e4ec59354b3bfc5d440000000d0faab150ca5406d533f8eed9acfaad30ac7250e8d13ddc96ca4f254c7e63fd01ad54a7e533eb705c6f686d0029d80e04a7cb3be8bb5e39f632ba861d47d5464 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000797113a8f0c7c15253e3c345292e16bc7add78605f2b08d551e394d5f5c6b463000000000e8000000002000020000000b1fb9e7e28e943d0416adb8baf8d88940e2d646b67da000d196803649dab740990000000a9eb0c78b76f6426c4c70443bc99904d246d630079e5474a47180b239535446ebb8ab5598532e6f2e6e166cf64d4a360ab666c12304dd16f271d41a694d6cc391e338e6b4b142589d3135dd1f2f9ca00dfab6d8ffdc4f7cedd9e1e1d40f731a87b2855109756f51f9bb765b934dc42ae5bdebedc626fd28c0f543f24eb5ef00b8272a9020011a9387f4e234987455a89400000004f401ccf80a3a13c3299f6b3195dacb52e465be6c0821f05463729397e4fe4d85664e2f0bf9ec92df5b847c43ee3dd90affcc392fe466a39e95f99be0a1310c1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430799075" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20ebf9da5af7da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2060 2388 iexplore.exe 30 PID 2388 wrote to memory of 2060 2388 iexplore.exe 30 PID 2388 wrote to memory of 2060 2388 iexplore.exe 30 PID 2388 wrote to memory of 2060 2388 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c20cce5987c01446d15a63f98e8e96e4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500516080bc867ef52579f6be9ab99401
SHA1d0ef940f68501b63726a10889e53b6e439a0bbdf
SHA2565d86b50fe6ccf6564195585825bf2a2c97ce73bc5a7465b931395e3e258289b6
SHA51244d5062398b08d28858e89ba2aa25ba5912ace3768c1872aeb4156a33648705082ec3e42f3d27d488ecba096619b6bb0c7796f5c069bb2dfb2cf0e7b83007206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b062d7fcfe463961fef542ebd446a37
SHA15bba837071ee9a927f7d924837b4f2a52fc07ab8
SHA2568c1d297eb86461fbaec7c45b3902f85648743a3c97de1089eee78fd6e22554ac
SHA512a06ad5d1fe58984bcdaabba4c1aa1e2562302080472bcbfc66d06ae9abcfdde16bc2b0e7daedb93627ff27373307b2891ce6f83a79c500e20f24910923d1c0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53de65032f3a42d6b9df527eca6cc4c24
SHA11023b12b3d14ee0040d80c8730e46661f4c996bf
SHA256cc9d26a8cc07087fbc4f4373e99377089c16a17aa007cf55b7e25e2725cf0368
SHA51202e122786a3f72fb6497f4eeebdac7a63565d45ef8ceecc98cedac5b25a297bee2055f971326920359acf156b2750dfa60803c7d1078624d8cac15914c5dc0a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cd196cff87204cc9d1b9a41211f72bd
SHA1b24d220e40ec1f6b4fd4b3a7496eccede28c01a7
SHA2560bb4159a5f676a005abacee22e68098ff870bb2e38e5ea44ffbad021ceef2131
SHA5128f8615addb80ad9aec1224b9f3362bdf1f58f1ead6c784ffd67f609b9641daa1cdd256f8bb866b4a5b8742082d2c2b6d377c0455ccecce68fabd49f7cbb8500b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595825b3257675624a7ef5f0dbb1fc535
SHA1b7ed200b38af0496cb1ed5cb5480784394bb8641
SHA2568158d303c1f842c7bfcf78918de83e5037033c4b0884b13b8badc5444508ba12
SHA51232837642a0c098bae924adf4d41b43674e7150b4bda4ff96cec0a71996f5f62f1a0b1484f3ee61489439fcb30ca423cb13c10d3999bf2c4ffe033158d4172077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a108135383e71bf822a8cb4d4e889c9
SHA10497ffa9babed51cad177b4ba4750f6f182270e5
SHA25646b79c50c9a8e144f77a898f7d03c98c5a5e01d6563012d403b6765dc9d88e16
SHA5126cad24fe75ef3652d2a3d382d4a596fb049156f3186a2f71d5e2e290abd908de09fa6adea0c27390135d06d72d11474ae026043f39b9d4b44d6744464e6bf4bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fed35dab7332143a03852d4db1873a2d
SHA1a431074aefac838111c8fb755020c089736bb682
SHA256ed4fc7e77a70591dde2226e1e4eb46327c838878435eb70bb5ec183ec6904cc5
SHA5127b252ffc3d9daf30f110f0f9497b111524cbf0f1fe3c5dbcae36c39927dfef96cd0a54d628a959837662bd251db278274d256a656819ce614057c18ec0192899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5566eb53a4cfe13f098004435eb4c2225
SHA18ce4a838ea7c6cff7e1bb839f1c8751894e9296f
SHA256409f12f65ce001e1e89804f295c82470c7044be3b522d2658444e16ad04e562e
SHA51220dd61bd27b5bc7c54a85843e373fb90da5c6c40958613048dbb79780117f628ee9074e660af117e930fcfd8805bad2f54bd147d469c1901116734c281c2a249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9b470277225f8099cd7c68dc9326194
SHA150fa2de10e38d63fb14abbd149d0bc31801522f9
SHA25613e3b3342bc7ca3908fba81f7b3aa06505c8051bf343ede5b0de0713e944eccd
SHA5128f2cf419b38977df3d1b8a9da85ce2d1094c2a7a235935f17bd7225dea34d0b82b94226a190f9286f069a9b0fa1268b78a6d18d11b6c6ae8d373670f24088863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b40acc49987593bb41785ad81ebc1d3f
SHA192a40e0f40ad0d974d5132f090389b951e3eba67
SHA2565a0867005628ebb672eab061d2f8fe7603c25cf3053ef805deabac28747fd222
SHA512f535a7b7bd0a2bb1ae913ad98bccf3ea45d8e403122b55bea369078585900537b8644dcd8f0d6c7fb9a375d8a48a8384e14d392e12e7da73d6b58d11df0fd77a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db2c4f1f1ff456c17364f6dd91c70eaf
SHA159bb69d1db25d1806a805aca0f779e46e751111f
SHA2563afd075424f931e45cf4ed6e88741a92c667532db3080aec7cf88531a01f649a
SHA5121b0319cbd23946d8eb7b4ec00374b22eccec326dbcb9693998c00bbd695033c3df9a12b26306ea2f13065a76a2aa839b7f4dc5b7777595eb67110c8951afa703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae58154a321a26679663858b37dac6f3
SHA1a4d8b7ce1e4df5c5b093afb3793b1d898e739109
SHA25636cc442dedfb611995d59e2522e398e4199561e25d27f4739555527880dde4c8
SHA512f9bbb264ab38b039a5b6dd3a87871c2776ab6878917a7523861c276e27445486fa9a25c8d5d71a3bfa0481c2d991b3bd2f1c2771724a5467fe432a2d65c72128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63a2de53f464cb090a3f3d3c450cf6b
SHA128a8d91ff9ff537061e0a7d4440bcbfd891241ef
SHA256e856c1438d9de146e6a4cdf35e6ccd7c1693c9691ae03367070dd3a3c00a7e82
SHA51211b4d4e0366680abe253390445a0a34d05ec2fe35113dfc08ad0389106493feff040a7627fb7a5f2dd02e365114ad5f8f8d0c47ce643e33f35c8203700a4924f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c822afcda4dd252afc9222fd2e1a99e1
SHA18cda51be828d2ce1d565e13f7eaed004c07e80c8
SHA2566695b251f1290ccc53c00142c1fed38a857eb0ccfc22ea234ba70839649f787d
SHA512f2209ed5f275f52b8ae01a07ea670a312bcb870865ff10ea60fb8da699876b1f6bd7e9099d76c8a08b3099edfa1bc53dee301eb3131c36f22b4460c162e76767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0c28bc101e5d2d3b44b43f923d0dbb7
SHA18ce29f80b44873ab59cd34c7b7f0a3b1eb7f52f6
SHA256bdb5b7e0b1f76f7427a449416ece15f5dbed66df7b36d9762762c8e1acde4cb6
SHA5122e58b43ee48ca722f6ed42a7957c28a90f3f5bf2ddad9a22d7a7e1e5557a1e4b2dd392378b0da681f96668df22fe59a3604bd45193d2a31b255f811dba474b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a27edc4e9bd5f30a3b55de203b2635e3
SHA10a221e23283d7812fe4cbb7872bfb3e9a9aede85
SHA25663fa7f70b3d8351b93fb449d19df0ac4bc45a4bbf88e5e463e5426182bcb7df0
SHA5123382a76a01230044782f4e2db15ede84a7a4569cb88c4a425d3c404bde5cddb8a002116934bd9e47ec9b9ce19a22b942b204aafec927c9b9f051d1326282f1da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552df25bcb37f34e07ffb413b695bac63
SHA1524d25dcf72cde70093a9aff12e169d0f5e05e20
SHA256e89be7e20179ec17b39c4766d78e947bf8ac6d320a2daa94f7e3137017c4dfd2
SHA51283d8b7c57697402e9fbda783e2047b62e20f2087fbdf1970458c4be8a13cde2080e3809cb830f0abc23f2d55b60d5a2c756173d6548e9af8dacbda9b21426441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517f858e5f4fb7472647dd5507c772a84
SHA17172f43e08c06706c88270a30bb3c12e5b8ddc03
SHA256271be5bc9632431763d84b9ee33990e071bae6e63fb0a8c7dfce5135ef07b3bc
SHA512ac88bdbc6c95d23e6b436c0a447ae25a32e7bbecd7e9f41e06f44c44f3f0b43f2d95945188dad51b18499cf8246ca0f915d01795bb2fbb39d551d8582fb48ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538b13f8db9d07113bf92ba271defe329
SHA1b4efe516487ddee63144c4858d3958123ba460c2
SHA256d9a525023bf22e56027549cd6540f6a1617292228f5dff5a565c4acde5638d60
SHA51209c5de1c8e5fcacfbac989a1d92af4b88d1384325efc0e8a077b149c63a3f99991624654f897dcc5d2ba989f3908829c56d3b69226ceaf1fe0bdf5edfe727acb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b