Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 00:23
Static task
static1
Behavioral task
behavioral1
Sample
d7548f1b1a2345155fe2332602f1be75_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d7548f1b1a2345155fe2332602f1be75_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d7548f1b1a2345155fe2332602f1be75_JaffaCakes118.html
-
Size
128KB
-
MD5
d7548f1b1a2345155fe2332602f1be75
-
SHA1
1dd4eff0b41b167ef03661ab10c3a4d6cfb58b02
-
SHA256
ab6e0d4f03eac702b8997273c9d747cd43f3391cc5477498c9fca6098ca83c1b
-
SHA512
e1f22a4347ebadcb51b991541d0d985b396278ce41ad0223ea964cf98ecbb86b7f6addc5fad06a8a5a13b3acb9b827e3ca50e47ac2ef01a55667a3c5fdd51b5b
-
SSDEEP
1536:O2+lwKpyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9w:O2+7pyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000008623cd71eb91c7080e93a4cdb3dbd765e0bc7d1ed537b3f3a2cea4eca7080e5a000000000e80000000020000200000005c7249056920f2901f42c1bd3267cb25da6e9539cea5d4bef89e0040a4a9918820000000a037df65faa1f4b4170327f4c990f49b1c3e44d6d639878899a609d6686e707b400000004d729d2bce15c0086a05e0e29c5b8a42fc9db31fb97cea91cba4bc1cc0fd51ff12dddb544384b470ab51cb042bea9756ee7771318124520f3698722996540bf3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D7D85DA1-6F0A-11EF-AC25-4298DBAE743E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b04a61ac1703db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432089650" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2604 iexplore.exe 2604 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2204 2604 iexplore.exe 29 PID 2604 wrote to memory of 2204 2604 iexplore.exe 29 PID 2604 wrote to memory of 2204 2604 iexplore.exe 29 PID 2604 wrote to memory of 2204 2604 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d7548f1b1a2345155fe2332602f1be75_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e245ef7606de27334bd71d56fe311e37
SHA1e120137d88793c7431c407355aa1bc5681955fb7
SHA256da2e9d650866790b418ded78ed1eeda22b3b1e751a1daa50c343c516656d7fa7
SHA512ac1543e529e490224097ce93770ed5a6b5e6679c611b8694513b0828be5e9fca7676cacf8195625875764f30ee41449aab49b86c1f809f94317943c4c44f749b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53106b81a4d69e32eab41e0e69f470acd
SHA16b4a95b37143b6970aeefbf4c9cf3664328b32eb
SHA2568d16664b5147b2d59159150c467ac212641ff99096fde6a41d4edd544093a5e2
SHA5127ca92ae5f8a18a78942089ff2db6ae7d34ebf7508b56e465f9cab6ec8ec193c3df1d6f7b00413a981ef5882ea4be44399dc40b5a9e6f67398c6b002a134eef7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519fbc32e6e4917f0201ba4596e981287
SHA135940c8f52a6df7c3a7d8fc1606c6b3e5fd90da9
SHA256b8a9ba333cfe3ae81168b45b97437e626c5a3b5df0d78be72437b24e12fc335e
SHA5122003049e3527ff8419da213af1cbdbd162da13b4db01f88e2e4178a3d7930be6b197285f1be30de23ea1280d496ab575212c7066df9c9ee8ffe6ea80660666e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee72f1f4432a63ea55c9e5f62f909935
SHA1ab479b43cab1a18be16cf8aa4ddba591a8adc0a7
SHA256c322752eccb345e2a38b69f8cdd3143b1f420c012aa3eced6c153f986ee652ec
SHA512d54b69e1da65ab2b877e24ca05ba0ca3e8101581679b021fabdfde8f0b03c83942d9a3212414971606275d4ea0dfec4e9cf2672c5c83b38bda8bc25d3f33405f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c559f9544a8c9ab02865cc5a913204f
SHA1a949a615cb03613bbb34a8c8aa00e7a6bdd81443
SHA256d26ad7a439c1f0774dc3f0068d712b904f4ae1028a87372eda3fd13bd8794f7f
SHA51294bc4bf9b43ab73d8b614b319f20489b5bfda52826b496658579f77329388bc8d3cd46befbbe5b0c6dac01b15179781e14e7f25b1013c09d3585d8b28d1175f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8daeb978615bd6576be891fac3395d3
SHA16eda71a2ed8d0d25767b123ac13e06e9a25c8296
SHA2560752f790e9e538aa3f62b904bf116b9024b53b62db7234cb38170e8aa4d0f85c
SHA512e55368a6223d446046804d336345deb400c438ec51740cc5820c4d8445a717b651c5b018893f364516c5e1ee254b67e27424d58e5f5669e7546e78f9320de483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef16e5a690a0458dcf392d3f80bc57c
SHA18388cc148e1bcc012750962609680193572a8341
SHA256293ecd7860e2c5b81adc533d9c0470bec8b3623a036d5645710214aab4e2e6fc
SHA5122a7eb01f55516974e857c20dfbb86e0c453753bc1fc2ae0bd30c2885dbfd23157e25dbedb17d0ae0979697fd88a719b95018690ac8e5f128580009b7274f76b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5230c499ea7acf26ff20186e344c93ca0
SHA12634f44545fcea0c0b619784c43dc8e7fc1a18ca
SHA2560115f4034d00edbd9729f2462ab45862eb82b54f157b203b5ae2ee58966eebef
SHA512786ad8e01265165cf394e29f71d6de727fbfd37d6d0fbb272ef5c2abe10a957e4091ba8dc266852fbcf55f4e5b171846476e8289232f242f0da54fabfe2c5b24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fec82ebf1c16951ef011665f553ae12
SHA1775d83d1da667c8b1e3f7e89b8863ff698f9707e
SHA256be2a85b191f2c458a1a56f1d00a7ebcb61ad90519b8abfba2a4512b8f312fa82
SHA512d42aadfe0a11a672b399884efe1bfd8cf8543d2fd35eae76a4ca11ee37ae5ed7ecf8bd1584ef3bc8d78965b006fb04767388507293d5bab517e5766af01ff49a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5931add99188d41d0544ad011671d622b
SHA1291fcb822dbc0b71f130f3e17dd90b90be2deba4
SHA256273e3f8bcedc26ed30cdcc57148803be908670fabbec3522828ab707fb7b578d
SHA512da1166474de1c90f0725a6bef3d5c08e7480e499635774e8bd6f3a612f67e775019521bc6772ad06eec7aef85b295199a165e763966d56e2b885312160ee125a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f85f42a0cd9f8d271c532e997a23b202
SHA1e5c43e0c83a8d16d2bd4a842810bb413e0f771cc
SHA256dfd083bc9d37f56c0435097b6e0c2f5e9595f5dda360672671fb4d32958b0559
SHA5124d9e42f40f446242f612f104f84980970cd6128c732be7b5d4a01699e956e3ec053e812875e353235f3bc177fb0d054e7dbca865b4018a4180704fb177928439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52137b85ad2e4f7e0af7c1ce15cbedfa4
SHA108c129fa20db6ab7afd111cf49d3cdfb40ea8dc6
SHA2561a1c0b9a998c74a8629b0864e46a05ac1abbd94f9040c58d6a1115cd8418a598
SHA512db74f111af6ac7df158ff6dcec80d3ee6d0f524b49b9996d2be12d6d6cd0546fe78ee282a76aace15040181d36cf1b958e6d98b892032a0a9ad4c24a0042ccbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d81c9ad1e741e5932a989e71f8bc913
SHA12c1806116d38da2645a735de955ff3835099d0d3
SHA2560987f382030d13b923a29e42c806cd395eafaf676b0bc2d1baef1254cace0dad
SHA5128105baf4031def593165e2503e336385c0c6057e34e7ef0e0c72754f9ba372e98353046fb93972af53f16c39f5b2be236d665f376bae48da60c347ddfa380f15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e8dfca84e85fce93ee4379836b09228
SHA121e1ac444277fa310e704c262c147164fbde5210
SHA256f6aebfa3184df9ccf6c32273fbd1f43bd4544a636b640a69d71b373cab6a2aa4
SHA512640aebac741a5063d8f73267e3e2fd9b2ed3567e277175fbd71dd8a7c12c980917f8d8f8850744aa8dfc702c9af58386576e62dfddab463c259caaaeca59a464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5762f1e4e41d7ca4fed9c5b671f1ddee9
SHA116ddfa6e419725e4d0c54e757daa10173430f2cc
SHA256aabef7537caeb7fc457b01ff6af855ec33db2bc51f21c48fe31c77b3efc7a2ff
SHA51295f341c211b5d2c7e3f5993208ba4577e225907e98bc44c7237782da332d121c4fc4dd5c636d30d8820152804a6209af3cbf704ef8c3d8d9144b48b82e554220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544bbf8f0751b8e3b4feda639e3787baa
SHA11fcef642e49bb83fa5e0f2c03c5dcf77b18b5526
SHA256c73af87b75ef99de137d4f5b368bcdb47e909a4022c1676f6e7b8f5071997494
SHA5124620ec821a6b21662f2e5225db544d3c28448ec675c9eb55b59611d109f67488dad33c1b026f56cc2f2d3a3fc4002c3b4b30c9d9d5850cd245a2f2d0d79ada1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5351cc380e2cfc4a28accca78d0b81740
SHA1000abf6bec58fe8a41a7478d9365a649a8796363
SHA256ebbbd2d95e89dd11c84d6dfb8331a1e74264b61d01637d0b18e3560d43b7f67d
SHA5121a76423e98137992e8848690c788e0a8e21effedffe66282efaa900c1b388c861a295ef28a9c74f85832bcdcceaa872912e3125be0c5847865d7f91e706780eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a78880d07913297385a6a1c6e9bb5590
SHA130c5456f6d98b2f488c429417478d4f5723182c7
SHA256a7931a24d75049491336e372b69e56041e92d3f7d290a5654986b4a170d474f1
SHA512b16f67e87f155f62ab5ac62b655fb998921b7c28d98081bae7ce53892e872abefcee0a9e5eda0866d1124220a9201137d8b9f8fb941de7cccb69d0524b45150a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d123c02a700bde07cadabc0d818a86c
SHA175fdbbf80d9dcbe8fcd9b642174a935ce804c3cc
SHA256837f1dfc87469375db0551c0750d7270b1ba72616551142fd1333a3dce24dd77
SHA5122d5f6c4d7a4c372a7e5d27fb9bcdfa3c3e4a7efa851b10daa5447f42450544f342d5ecafad8486511c9f5c32f3e3cfaf2cd5f489995ae032e76be11e0ac86bd6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b