Analysis
-
max time kernel
119s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
ce596da7b23367f2e4862a580921508f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce596da7b23367f2e4862a580921508f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce596da7b23367f2e4862a580921508f_JaffaCakes118.html
-
Size
51KB
-
MD5
ce596da7b23367f2e4862a580921508f
-
SHA1
e86f0da2d34f6a5824b46bf365ebb5bf537b994c
-
SHA256
86bc195d77e84bba16744bff5fd8c762d0de98c4d6a8e58dd624613cba38eedf
-
SHA512
07aae0940112042b70a48de67e14fdad070dac9c71a338f2391b577b0557b1b4a15cfca75b0209a56dd3b59aa200cd3bf32490769da7b2208e21e61780981554
-
SSDEEP
384:NZFHApXITWD63hAPEfCyrAU3hM42HmO5d/xGn3nivA9yku+JbOfuOctQkzvIOmQ3:NZFY6x/fM4+JQQfbOQbZe70ueTJ3AWG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{413FDC51-6BF0-11EF-8AE4-465533733A50} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000da9795249a6485fd13d998b14dcd96f4fb3651ffd254c25a7e476b7a61950247000000000e8000000002000020000000f888a890997430eb9818930c5a69565f443e3363f413aa5c5272a4816fa446342000000045ef8824103e9191083edc7da501ba045b283bc98805ae30a77e1b29bd31668d40000000a126a29849b07ba995d8b948edabd3ecf72a8ccad9f86516a8493ad65fbd76659d6fab4050356958a70742f22cedcb19c9d23c84e3ccbfea90550dec16e5b859 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000002d3d73f940dc8c692a2cba40591a0dd16a8e3faeeb0ed970dfc102f0a84f747f000000000e80000000020000200000007cc84ee6af6047525fcf1160aa2d4d5bf2c0a6dfd3bd647d23de363fc983fe51900000002aef6d94dc8ff3faca7a9d1faabe18db432ec72cfce5229c8035cb61c1f4ef5e871a0c83dcdd4e1ec5a8f56f24615c6e8b9dee4a196d2f8f758cfcc3f9084000335e8ec4b88481c9e1cf4005105f4ea97ec2522d3900e8c45668f7cf49456b0a28b9d75b2d42fffea1fe4d80eb201a3296f3ed5665081d33cba0c5ebdea6b5944b6e0910c0c75d6ade82ddab5a7340c240000000467c32169f3e07c69e30c3d61c8aa77d8c2fffa668c43028827144f0979d69b43fb0568b794a26e6ad72576f538ce718d65c680fbe1cc8d706eac2ba78d2d4b4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431748378" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c55b17fdffda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1056 iexplore.exe 1056 iexplore.exe 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2256 1056 iexplore.exe 30 PID 1056 wrote to memory of 2256 1056 iexplore.exe 30 PID 1056 wrote to memory of 2256 1056 iexplore.exe 30 PID 1056 wrote to memory of 2256 1056 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce596da7b23367f2e4862a580921508f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567e4dd4956abd7ec52cf4a5c77cd489d
SHA1202ccf3e3d940ede01dd8744f67d8eb5f40b7f7d
SHA2567cfe1d054fe9a35bda9acb8f4c8d0c5ccd7eb2903b68a646e516642fc3facb21
SHA512a406dc1808fb76232291220aaf4b5576fd2ff9ec15429763303eb5574e9300ed655d71ee2754811fd19b03695da7add168f599712897ebf54b4c454d8cd87003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d91230b2a4a5835012fc50ffbc7b4d0
SHA1e1b9a6c2f933250d7de55abebddabfd327931f48
SHA256a2a8c3b8955765851083015ca6e8390c4aa306f85e76e1665ba85f979f355428
SHA51211820ffe36794f8c6ee07417a8a0eb7acd4c197a16dd775cd5ff5046cf1784809b1962f7e4b5391315e5bc5874b1ca173c208fed9e407b2bb3f90faa91502c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b3f6ebfb5de272da53ef67259e3106
SHA143e2e2c9b2d736b6951cecfbc0f276296ef8a233
SHA2560bcbea4cc5fa65770af36326c1d8fe97483d058fe7907c5b15a31b5fb4a207bd
SHA512833e73e2495cb6870ecb95f0ebe79f7f8557c3decf38beda97410daef814b91b8bb12d2565121228c25575560f042550d9e78420b23f47064e1c5669572410ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff6404dab0e9881778c6c2a195d9a495
SHA13cb04376b8f8288c93ff1deb1fcaf5b0315b448c
SHA2561bedc80f2ff30ef169f32fd15723d7c68ef794708add5dc8b4f359a2801ce30e
SHA512f648045ba05a340e979c04a3d60edf8c4ed3ba790de9e938c5a62e12d2bc5dc1b604043a1dcd0b63ffacfde5f106be1c625ce16e2442ec43fb03bcc41b09f2ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5090f401860b362ebbd2e658f3269c772
SHA1198650b8f70b8f72e8d5b27d5e21b6e91b27d827
SHA2565b764857124adb103095042f5ddf0f153b488b67500bbe2fcfb73ea8106dc4d2
SHA5120abe1042c22c867c7352b0e85a66a1be0f0a20a98d23e8c4f06f4a4fa19d0c810449b6b440070013f6a8272583e6eb6be396b2de28aa7f91ba2761bb35aeb103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5195c4c199ba66ac70e23566f45637684
SHA147f788a77df5b5baf2ad1be1aaf00f856fc2a6ad
SHA2565e4dc10a37a76524d8e3a76214875d0605cd513b11cf02d400378df8832427ac
SHA5126b8c435dfffb114301e9f599eaec113d7409659a7c9a19484844809e15b829ac969a8465f593cbdb96d54f1eb3d4e8c7c11f1a8e8d2a7f4e7330cbf005da1b65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b584466ca921afba33d004c5a8b94763
SHA1645fdaef27b038d34e185f1d0237be97c015a7f1
SHA25623e957dffeb5a3d01acfb3ee784a8fcb7274cbe424c0aece15819de0b5e72d6e
SHA5123e7debb6f48060406a75638a1e4066a4926609e25379467cb173be5ef1c46db805dab65f6e6198984bad69a8851ad8ea6189bfb852e44d929fb16237e92baefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537d2446d0fee721cee037ff556237c05
SHA1de806a94a401557f50b0418d4a7a9df147336c92
SHA256195722a8422db68a5c7e7ff1e922c2edd14d9a92f69eb5738b0c5bbd818120b6
SHA5129870dae91b08ea879c36b7e3463c4cfd8a62074adae7dfe94799d1cc5aa40983673aea5c07b45830fdb9656c9cdc09ab9b1cbb6a1ac4395d4b3ec409a7ccb393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5215cb0a6eec89a631dd5381667c2bdf6
SHA1cfd842cab8580fb1ce93db6f61f5a7b1889b8edc
SHA2562f767493b7c35ce249789ff20337704cb206b981a6f9e828c86be2d8a0a7cd24
SHA512ba8af1b9164517d708c9ef77a712e651c8f2c88394e017d29f462b40f20f6a09f570a3e0e7ececc65cb21612209e35eb4b304193c71c55291d1cf70cd99f6b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5025c90f455bd64725b22d758780bf657
SHA113554f25b87804f48c20b6281a8938dc2bacd9ea
SHA256304eb58a45671dcb267a050da6c97f06b18174258bd55c7421e8e8522829bab9
SHA5121fbdadf6b459bd92003086666cf61d8331d394166b5fe9d73ba15965bb7654fd1510a650fd8dfc34e77a7bc79504c9eaeda714feb115c2720008b80aad25241c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583c8d593f2e82df8b8671eb44865c7d2
SHA1b883b1b80f608c578d0ab7df3388fff491d0604f
SHA256d4dd0d2d10bb57e9da75f80b12c4d7b13bea386dc9e748b42df345f679d73667
SHA512c251db79a518473d8ab749f1e7c53077d1af286e945698fa9e4c32f6384b777e78e627eb45798c1f889b5839f8416fc80011f46669ca4581204714b68cfe2950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5872240cd572148298ab63a4a68c6a32d
SHA177c50a37ac76c92c53914488ddeba02921ecd01c
SHA256174f8182d86778f4f1f01a09dcab1653880b027b3e1bc6c4842731d6897c3c62
SHA5129f17640ee45ae37887ef2ad922b3108d5e4013f48e738ddb4417ce12327b8d7a5e4c0c1b84b67a141b59c123fdcefa4f086b3b65b9c2a3e307c268c5dd30d251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5027ce08abb3d84350d88630075dd821e
SHA1e8c97d6e1a5a8c2393c00aa31c85f0752cfdd65d
SHA2569e64b12c389fa0743870432bfbd5a24523d9fe68145d98be2e8e685f882f4704
SHA5120890b6ab7871d224b01c0427f8a29a9de4ede136809167e7d2e1d377a6d16827f5d56cb8c0f21a26de2f698e2c20f4a651d3771b6eae858e93efabbc801608d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc7d696443c3effa0906561c3a745e38
SHA1cad0ca0254d56d087545541e7d38840103bc138c
SHA2563926929ad20e949be8a474c9955c8c578a7c57c14798ed70df56a80e3599e141
SHA512d180e127843783c6c6d4b73da60cbb171be928b2aec85d6e2127019d431677787e59faee2aab4c54c9a33dbf120439fab190895cce7fe0cd79c4180a26725918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fe450ad21428bf6edf5b1d7765f731b
SHA1029c421e3c826672e8b33ee696e63ca044e68f57
SHA25606a1790724c3e3d30438338353abb0ce1e91ce272f982bd9fbb601d662c16e88
SHA5122ff4556d30d8c877076746fe323bdf99aef2066eda0930c9203e4b42664eca4e270f8c270a4f7af2d41c6c36d65518e2640a42085613ea5730e98f21b5d508b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50070bf76b2b7f5bba5e9bdd4624a4747
SHA1004c38949fa09e79271e8a3565e51373b3c346af
SHA25668a42d6739edacad08d3e2aa959a0de3942b65de0d4e030c4b6c3a4458d1582c
SHA5122b4a5f86e32329e9d9cb0c171f86da341073aeafe164bbde2650df3a742406c0fd2fee55aabc30af8623b8e96d9329597fb830b486f89eb556902e9862365369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f42737366d7faf54c6feffa06136e9d1
SHA17c3102d7e3825a6c96628b9518ac1bf22cc927be
SHA25608cb045c0f24ca579760c1d83c34a08b6a01f0c4772a47839a76e28257916278
SHA512ca9bce76cb469b98b18a8e0568004cad893f006fb69eeccb134a66a743847b8ae8ca73129561ec7401955dbda777dab28c2330f7de6ccbefe935e4e7382516cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cf659f5aaa057dda4fcda2857d73bbc
SHA195a3371152373e24e9e7bcc0c7012de80fca6898
SHA2563ff2cf67daf9597543a15ecb44b8a5b9ce2c4048c541234122d4cf8757632c27
SHA5121169b3dfde0e38de9cd2742ebceb89831d42fb6973ca6dce12724d59480f373bbf41c3b03286ac96b1933d46727ef4f477c02a3a9ed7e3d50c6ed5ba71e5b8fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597aa7834b88effcfbce63394a13582e0
SHA1d8d1d04a4a7e1586e6232341e96ef7395b07eaf0
SHA256afd719aa38e4dbc99248b7d73807685f41fad997df287e40a49a69b06e460b7c
SHA51245c241d299d1dac1d26b7850d3cb2a671f52bce5f7ddfbe499d9515e0dbfa3a71cd593ad25d00c942675ab204e95f9fdac96e66d4aaf7a2a7ba571fe16a9cf23
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b