Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
ea92eb494dd0756a8b9bffdbe376f6d5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ea92eb494dd0756a8b9bffdbe376f6d5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea92eb494dd0756a8b9bffdbe376f6d5_JaffaCakes118.html
-
Size
462KB
-
MD5
ea92eb494dd0756a8b9bffdbe376f6d5
-
SHA1
96ddf2d3ffd5fa213660b5721a73ed01d2721852
-
SHA256
75e04045f0ca222e8c1475f8dc422be5d346cab2e19aa9f33496572f162048f8
-
SHA512
cabb1fc53d17a4ed3697879de901cfeb35566df806d1ea18714f165686b6f38389dc637fc058834f0f54a6f95201045625adacc498bc0d7deeab94b0c013ad0d
-
SSDEEP
6144:SusMYod+X3oI+Y3sMYod+X3oI+YKsMYod+X3oI+YLsMYod+X3oI+YQ:r5d+X3N5d+X3y5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000fbb9a2fa93bae51c060b06d9ca0af39f96b70153acf5198ffc4dc2d8baf37aad000000000e800000000200002000000046da3ac669e9cabb2efc720975f566c3b86a3dcb8adaaac34f063a0f5a9531aa90000000ffaac4a7d60ab606adcba11d2dae15e838814b8cf68c7c3318b98967dbe5b2623f680ab5fdfe248b65b933486f11401b66412547dd589329a97e90767bd86fea971db2e95e25dd34be3a268fc4660f682c22118b482a461a2741612e152fcbeafe18dca7b3e66d9848a33418c670274d1b4a85974f4c189256d36a12e05d4a50ba5d43db625a2489b8ca90ef1dd3bfe7400000002fab656b84bb58684fc60a89e645ba90a0b6f3417c81d9f39c77c7f3a60e534e55d54bc575d6c31bd44fc1d1d0e8aca089c3ab64920dffe96ee54d213328f7cc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432881533" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6003e76e4b0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96512161-763E-11EF-91F6-D6EBA8958965} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000b3d6eb4d5e7a3f0362903768f5bb4de39bf189b6d3e95069ff74515acc5f196a000000000e80000000020000200000004c46c81f81ea3e97ca7b9053b4c9f455525a9658f72c5aac6d0382dec7e199ba20000000d885e289a1d52df64c917d5c4714f29c05821dc2eba39610298c1470386d913e40000000fdc876e1386b35206d4c008b82f670dbecbf1902e0f25eb4e26002f39470b59a3d6fdf11785f920cffa244e8f4c82ce47c62df6e15455b4f6a163df4740f326a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2632 1760 iexplore.exe 30 PID 1760 wrote to memory of 2632 1760 iexplore.exe 30 PID 1760 wrote to memory of 2632 1760 iexplore.exe 30 PID 1760 wrote to memory of 2632 1760 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea92eb494dd0756a8b9bffdbe376f6d5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efbb33ece9ae28fed61263712f7a84ab
SHA1d18d7be6e1278b237d13ab20748cd40ad9e8aee4
SHA2569c1d778140e74991b55b8d2d35503e3e2e24384c679c59e0d4f630bea9db3b83
SHA5124fae7336bc65c129f70273126097dd001af45c6efabf2816ff35e4fb3d623c67fa934eee5dfb4594899b11bcc30501c6f935cde33e20128ae24f7b21eb3b85a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5832be46311ad3e3e341bc2a2de74ddd0
SHA16bb20641dac15f0d0f0ad51705fef3acd779b7a4
SHA256bcf3b565cab61811c7f00b8ae934ef40512813846f1a08ef3aa8d08f8d0d0701
SHA512371f10a529de355a85b690b1dbaa11e965e4ee9a81313336475821c4361df9faacc131993711b937df34f0c08d64c873aac53cdb5995db830929117a3ec0595d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e9472f3831468b6d9e1ed5d554ddda0
SHA1ef5794bab81cb7c42a579821ef005597af153249
SHA25626f30eba31fcd4862f1ddce7e67c4eb7718f8eb1d8e1df1829f2527682497e0d
SHA512ef53b005f8acb3707f0939da9c1a9e358696965e822e9410e602941068267fb07419b0f92735834d6822947091c4e3cd017eb80f27410b8eb27b0573acce43e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e77b02b8f769c4b24b0ae17f83e07040
SHA1a3ecbc27cd61317da68c73a59583342d1f7ac906
SHA2560bf33e627f44b716a81e9e7654bd1d2f0d6d0cb7c1ce44977d75dbe2cfcd7029
SHA5121e4c7073ee99f4148ec7caf37fc35a11a76a81e278074f66e65a6dd74cf04a5429d8bd32466e225ebff9dc5f380ca92d1ea27e82f7a287f3f7dfad281632e034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50607d74751e309f29bf60c911c5631fb
SHA18848376085554af12c52acd27a346717f4e2bdc3
SHA256f692eaa089399bb108b2cc86d9ebdd1aef65108683259f3caf724289d453d521
SHA512f95b6d873a190506cb2c80ca07478557e7efb9fa0d94b9f8910abef886e9f9acd372205038ab2b3a8124daea769fbba5595ea7fcb647b4ac02cbbb37d6ecc6b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce94bef6fa7919f3c9062b5bacd29532
SHA194b99f24f7b64eeb62e704e8457d7c399b573026
SHA256c369e1966b3ba7925520481b338393b28ddc1b6908aa3a690ba7ba6fcfe600c4
SHA512767a96b556bf12181b355de65d5db948a42b54aa99da5c269f83529040ac6d025d2e2dd15d559e3b9a928b0ff37124d27232a4da438d46bd7172bc1aa7fdb22e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5584c69cc9ca677eccc35583fd39b7a
SHA1027f115233dc0c3fe7cf671da58785347f9d20ff
SHA25651a5387cf9a98cf920936aa048f3068c94ffcbb0651931a5a208c649ad3b429f
SHA512b9fe20ce4d5e4d3991364bbdeca7d9fa275b64dc89d880b9a33ef331798559dbad67dbb190f258a4dc603cd669c730eae4a20cd7d34308a4771492e26220f27a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fdbfe8adbd43cd5e75d663c0f44199b
SHA1700fc6828736a15a34bb6e0d403805d315ab00bc
SHA256ba208c7ccdb2b7947f37c96deb344b56093b38c635126b055d2a765433c69e60
SHA512d5eb47d255734de7e338e2b0c614241b4aa216b91807587a8ea872d91880522f7dad232d8bfddfafe9679e3461dee58879cce1f380bd830141be320ba89033be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52857d1e408600da8c30625a773064134
SHA1ecd3fc370f8fd96424ef6625854cd71982d6dc92
SHA2569b80eb976e24c9349b716601f2e504aea73e5db9f32d7c1613d9d7d7c09c920c
SHA512e4a6033643d503114f8c97c57709f6d340257e10a31a3fba49fecc5e08ecb64d064db8954862779977fbba1c7034b9ba05b6b4ca9cdb139a6555efb781392c55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56426c389a8d1e0f50daaf5e73945275d
SHA195cc4f9e62b30fe5ed4832031be43e13e88e6543
SHA2562749c965e5e2e99434d5534678aff1a4fcfffacf0ba935dec8845e38f45b31ed
SHA512a0c84eb78e7c23a04b0b70710970ecf222081892c6f25047bed0972bceb71c37cb77878ebb38314103dfb1268e3eb36096e296cae100b6251c1cb352c37da288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cef7350c122c054e3f330104a5ee433
SHA1053d62742fda85991503ff3aa55b2ab43bfc6b84
SHA2561c3779d3daa34552b2803c2b926b76464e28857654197f7bcde40f3d9dea6fe9
SHA5125cb47583b87110f3576176c2d13b17a09b1fd8fce7cd418180d770d1995585c5e69d8bf1b9c6592427241799763b83c83494ce3942fb86d6da7432b108cf8593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5567c3a3933a12f81e9fe1497efaa1f3e
SHA15dbadace4375670ffd9336352b4d788d981f5f2a
SHA256a333c6aedfee7a58f87e8fc39a868cbdbefd32da764562fc3e1c59800ba9843b
SHA512c756a75ea5ee75bb2be9dcf39d74e2ab8a08751401c06547a194b4f5f3c76f5fefb877239473e0af5e8c406b59d3dfe27146ceecb58c80b18468914379a51ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d32564c914e170c425d1817cebf4a86c
SHA1b46316f33a327729982d1546990cd5912877e826
SHA25601c8caf3ea47bdf29dc44a78648e06d41944cadbac489b502d17e0280292c002
SHA512d2c7f02227c204870e140e7fa417f01146150aee6d9e256c5c596659e4330f630b4841a58396bdf357b9bc808fe3fd99894e2b47e1bbe5363e607051cde4738e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589d11d3838ad5f6845e692577c0d5f7f
SHA1ad2926f5231737c86b529f5cfd0eafc46bfea4d8
SHA25678894b297be9d0e280637944033a1a54b1d341ee25e5638e186adf4b12acfdc1
SHA512cc2e712aa09c5446828def4fa03b3fd0aa6a2dddb98f2f43eff77d657f6b8dd834eed1617bf7310923d7942476c9d972c87f3bc3540fc4177e6ed93f0cd4b6f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5912bedd57a55c3bf4badfd3f52042966
SHA1e3df6db3ed25ee7813475e3b06f7d7510b8bbc35
SHA256413e28d41262e207c657c9495e5d780d1f2160de4daa8615c1017ddd6745d5aa
SHA5129b1f0c202eb2a258a7290a305188ca62bdea4be35bad4268e94307db4a18439f8003c60d75134cbdf04f84d3a3b1ae9f23545e3a5e6c06e68477091b5a73543d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064f4915c9a7d199b8c9b2cbf012934f
SHA1e49b2bd61b47880853ef32cfe9d4e85fce5ee839
SHA25636a8fc317383241ceb92057c69cc865eefdd4055b155d155f3cec98fc034c745
SHA512cc20fe3e373b3ab629f04a138ade276dab491b492430562dbe171bd5be8f6586e38efd18c5fa083542d5d9446ba6d1601277425efd5d72313d46478f80165512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b127dbf38116dd65b655b5b9a95eded0
SHA1b1234f71e5b50a3735cff57e53cdc87796e77b7e
SHA256f74a1e7cda8442094c9ff77796b5859c29a5d419d292f57b7c7a87c81aadfd2e
SHA512d63cac0105352a08739c3464ea4de8843ce70e0832a7a25c8b65b800f9a538f94e8ea25f6fe9256d4a90472ff549cbe5415bf68ec13195b5d6df5c828297c0b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cc4525e7115542a00b4c72bfa516fd8
SHA18fa8f9fd365bd82ea67413481fde9a2245dc4220
SHA25689cfa3ccfcc7db8d367c2991cde7b6eb8d54796eb81d3f253e398cc5dcaa2609
SHA512b6da58c71d0ad1570e8a1da705af21f47519a97ae2e97f6fcc46ff603b7654d38b904664608cb90a47e645fd6aa125d277c080fd560876a6841e87915180a589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b73b879c4530ffb7e876c97375f26230
SHA171a5537d1d57b6487c8a2d9d1e249f56206f20e5
SHA256904c078db46de57e197715ef7ec658453afae5decc10b666dabdd251e7d5512e
SHA5126f114442c703a5290ecfc144e7b0cc61dda599714acb1dab7f5a3f220d445c028d69953069cfbb5c7ffcafae121c390b587d5f4a344467ce88e27943ae1dd1b1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b