Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 17:35
Static task
static1
Behavioral task
behavioral1
Sample
dcb86c08a326a5c55e919c4cd59ea287_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcb86c08a326a5c55e919c4cd59ea287_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcb86c08a326a5c55e919c4cd59ea287_JaffaCakes118.html
-
Size
6KB
-
MD5
dcb86c08a326a5c55e919c4cd59ea287
-
SHA1
b5dba1c73b6aeda8cb142a0ffcf6b6153f9455fd
-
SHA256
04c7179875296e963c03cf7efa521a5b6a75c34b76057241bb5c9d1c57ba0be9
-
SHA512
da46f0c9ff61a496fb23878d64e969102ec532c26d9eaf3d35176f0f71381451f81596fc1cbb8d3d37c8037135c7bfc427ac2356f7cb93a3e28c442e9d09df1b
-
SSDEEP
96:xqex8lIEDuSiWrzD5By/72QJi//I+xfKXS7XHAXAMqXVtX2PXb0Xk3X5ZXqjkuX1:4eOl3uSiW+i//9xfR7xMm0zB5UgIdrJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70cd3c643a05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000f4bc3c982945059906377918339e44044c7fbca36811d1f62163a6adc2b37d08000000000e80000000020000200000005d04208fccafd4d59c31402f23de2ddaef6b8c957633215cc61d110bb4c2053d9000000006284fbb7bc5eea7207d7e210e5a6b5dee5ac027b7c299e15d11a4c8e1324e6a30546b8def149ce4b447cb96be39782d20aff79ee524b80bfa6c3fc01382ce3dccf4b213cd49390dceb135c786b58df7454b114ea4e7adda260257806b694040dec54ae2d23d804b14405f830534997468f5c42e8bbb3ab5573f0c611ffec54080debd8215c93d11598266ae30bfed8940000000a336ce29cbc5644ec02efefa7fe4651abc6442c5cb8b2fad030ad329aca112c640a82bd5a077ef9f2d5b632b0b132e9f10d6ba04a2d4f90e872150640e6cdeaa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75181BE1-712D-11EF-A322-62CAC36041A9} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432324419" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000007b09b8bc4d25a0659224de2d7dafd0ba0da04d5e6078e400b3b98cf43f1a2e87000000000e80000000020000200000001213d3cbe532ea553586117e735551dc8d0ea0d776a885c5b7cb79997eb30ed620000000dd7a0c9c4698fa598e161376286981d309ea974fe04e15af7b509c998c372cbc40000000eb334cfc767c4142a96990df08aa8010060dee27cd46ec0427bf6f57c6110b53a61cdf771a823eca25702d48960564ef1d74942cbd9e7bee2817632e8fd57024 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2292 2644 iexplore.exe 31 PID 2644 wrote to memory of 2292 2644 iexplore.exe 31 PID 2644 wrote to memory of 2292 2644 iexplore.exe 31 PID 2644 wrote to memory of 2292 2644 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dcb86c08a326a5c55e919c4cd59ea287_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eceada715456be611d15bbb675272099
SHA1225fd1fa4b1b2da23fbb9197503669de9a675bca
SHA256004c61c2f4b35732cdc97d40ceed3224ed3facd20073321ed0f2fe56843b5f05
SHA5121dcf5a7f9adf4bec49c49980d108434c62336c81f31cc984b7ed293e68ba50671d7280465acd25ebc91eb224ca4109142ba9427ec3450f5e7c32df6d39e33758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e141d26f918bb8fbbb86c69915ce54f5
SHA13f8abfd31ccb587781ad1285d131cbc117846952
SHA25608aa7b0d816376075e2255666e054f5f6732683a784e679212b966323b733c58
SHA512dda98f7fde81e0aa43291b39528dd231c137216763cec5bfa5a03cab5cf39499628263b703ff3cf3447574884c4e77e3c6c6774c5bc3260aad419e97fbd9f5e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcec3f871877464e2c13a6f1a5de2239
SHA18d6dbcf845789f71c7d569a406b544047bc99b46
SHA256ab50aa8124b12adc32da1659f343fe3c7ceb67e890b6969db820bfce289a6051
SHA512156dde47ce33890e9cc858884a53e4293ccd95b5e9e24d622c4659ea0e0dc9de5705a6353607f83d7b37079d0dd1940d1f9b47c4de504920a193009ae51bf590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5807682b5d9ff14818d54771fe598675b
SHA1afc5ddbdf35b7fdab2673cbef6894b788bc6449d
SHA256140a97582e2ddb2141273782555e8988978beade992021acf88798c97e43c681
SHA51228804d0576351584929cd711f1cb1f9ff5cb5a08cf316d3db6525f67cf0dd6c768b8ef1a58d75cf2275db66e2529264249055d0a43570e4aef795d59060e42b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b16cc07270bf30749a886c420dc89ed0
SHA19868e9320aeba787b6db35e2570d208691c31b3e
SHA256264d3a8ad74d3fbc3547378ae887a658cabe632d19cdd33deaabdef3e0f9d9bb
SHA512c7d001944b37a5fecd8399a3f0837c881c7a68c05af77eca2a57f95040210461ebba756b26d018682b30a4395b7a8a6ba4c481b3999dd2742312e4175cd10379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569533272934e3eaab97b1ec6aebc9b1e
SHA1820a53a032108adaa207db063158d727a661448a
SHA256c35421f128e792a30b35bcedf9e36b1b78de87373eec00b689f87cb7a8a90751
SHA512359711e667dd261b26e410ddc4d0d5a67dd6803b54b373a6001a7b701449522deb17f943286947c0d1d900aefd7b1211397aad2a20b6fd2d7a0da0add0809108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53514e6af0ea33bcd085112652bedc332
SHA16b5249c42dc5c3f6b4725f3f439c83cfc2142b8b
SHA256fb95b692a8f5ab02fefa4d1034f35b6605830d90950cb62fb705d39da9d41951
SHA512154d7300a713ccfc6de0ad3dd10649cdb91a707d2a2b50ae9b7df7d4ab8364b53b00fea3fd536347d1db6614b45b8bbf5ad3ea48ec2d65a4c5e3d5a0d56c916c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5357730516cf3f391bed72abec37245dc
SHA12a60816fa157634ccaa9533388392999e3340a1d
SHA256bc990a8860c315c2471a1a3ed817d9d11c7c99dfbba70321964eabb78fd3adc6
SHA512007cd06ed098a479f9dd5c3c94e60a1169eaa7e92b6f468afdab8557d340b497cac34de99223706bbef4a30d27f2109bfa5ce74166e417380b67fb8f785d5df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b3aaf78d567d66b447ebd5616572053
SHA1b7a2f1337008eef1c3fd8800c8a53fe7c39f4db6
SHA25695894bd43d2ee59ab4f7c10077687ce34e514631df488d10b3ee4132aa01fd3b
SHA5126c0ced62a9db248b2318238455daea204aca9b02869fb34f034d1d6171e54a94f4fa1c45b7da3b690a4efe58361d41748a2c675646fbc8b9bc6a1538ddbefa59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a190e4488bbd5e5475f6b9c5f76e40c
SHA171ace34fa3b1cd614dfb41e6eba2f0fa54fbae7e
SHA256dea73ed3b51c86f66056f580f7c4632e32a25a6bcefdde258a9e35a6c182b18c
SHA512596b9df29bad3af1f03f10df93c3e31b18bbc464a17defe0289354e78a33711d217ec24331105b16ccb2498a1debfc88ac2e075a542396ab3085659795f9c0ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556626b46dfe6725aa1a89bb8b1667b2b
SHA1f1acc942547b872b3e5955e94b357d5a524a207e
SHA256bff538ee25dab6f46263ce5de3e7a1cbb13e6b7cecc407e3a8f7f33c7eb5710d
SHA512bc051f6073c92e0f04ce127512375e41170023e27e12865c6dbe4274fa7da693b66fa54a687a6d24b1eaebc93ccb93a41c7a01f644e8c05da2db09d44c65c5f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dfa5fdaaef58a8bd44a890ce064d6ab
SHA1d5318264772ecc84e34308d2a0cca8ab811db2c6
SHA256d92df73396bdcaf95cfb024e89befbd7587d5eab4e7c49c03e604c422158ad99
SHA512217d97a9b3b39ce60ad3d0bfcc9cb81ce382897d3156172bdba707bff4f952d19e7e684a77eb892121cb9748e9c5aa9179dcb2ce6a1146fa69a852c830892f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa478c6cddcd84ac4f5692c6999d6500
SHA10e62047f7e6126a9499a7f02b1ca51506941ac2e
SHA256cb1cc60bafe0df08da5414240b1e391d4244e4e0869c0280a34f54f41ce26aa5
SHA512c4afd9a700cd20ef1c48fa5710299706db407cd7180090319087f4907208f9cd8f37d3925dbca55a85386c7182cdb3f4eb8e6e8e5cc763edace5bfd0d4108bd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4b094ee903035a59380c9ebcd8a52dc
SHA10024270a08108a76230718df8c2339f647fc25fe
SHA2566c664357006f0b468421374d5d8c05a210f023502e666742534b104a99d4514b
SHA512ec0f47a70c2d2d9a5bb516b8cb028dc0624d596d90535240baaac26fd8e6c3adcad39a6ba1b7f4747f88d3c2b87e6c4f7344dc04d68759daa2ad30a3e26e06c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eaeab279e72854f5bb43b43eef6665b
SHA11ff88252243b2e20425e013d34ea830b2fc57129
SHA25618358fe00a3e13438eb956ed285d7ffc26a8a15cc2fa43b912e52512b9476303
SHA512f865ce3f318ca0972fe672558d8143b2977e73164a48a0f08ea1624d028bf515571621a7a83be1c2b37e67d6b371c58595b25df0c375cb2437e96195cba1ad07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5291ee8f16d0d013eacb5e051e4375064
SHA1b018ac293015b33c0988d59e0d6785ebf1407537
SHA2565392aada0c64d0fcf55954b30e10483d70f4aa0d03a26e638cf33a00409f7140
SHA512455b041df75bafe2f20a108e993c30e88d4b06ee402513192e057bb33c09c43d0690b7bccdb5e86b971083106447097df6cf6e72c766170524548b7f8987b2b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e347868133b497f7732a3e3b1ed17547
SHA18126d1f9087d755c6cbb1c0772e3ae7188055010
SHA256d1b818e90dae0b6e6f2e202cfd03295c33f8af71ad829c35e910f3513b69430b
SHA5123be2a7aca5202829989127b7e233a9a45f245439556eb66e41d73082a3747be86ed561de9fecfb88db51c8b99e660525f0892059c48c059130c660f038a55538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c66dc7246d70c8cbf19812af52d89709
SHA1a1d363308e188c2c373571cb458fe5076066d036
SHA25697aca6fc2d8e205b75007b822a6f22cc6c53d9a8284e35e915dbfcb825d37cc7
SHA51277ac303df46bfaa7013101c32550d801c78d8ac15d6489c7956565edd7abc0f8f3afaec66345754cb3aedab0ac523073696a79ef5f8364646f51774eced4bac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad3712c56cdaa237bf7c98c6727999d5
SHA151dcd407ef06bd9fdfe1294e9fabb12185a23175
SHA256751461c305071a997156677975dab1a6b86a37284d2a0a3267ab34f2cf203895
SHA512012c0f7d9ef0cdff5f3e3051ddb5edc6b9b2dfe01b59c614aef553a5c6a26defa71a12ee3e5f3a1b56c57f07128a27fa435c0ba7ad33571b35078e8a737cce7a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b