Analysis
-
max time kernel
143s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:01
Static task
static1
Behavioral task
behavioral1
Sample
eab8197da4badce2e638bde075b19a4e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab8197da4badce2e638bde075b19a4e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab8197da4badce2e638bde075b19a4e_JaffaCakes118.html
-
Size
139KB
-
MD5
eab8197da4badce2e638bde075b19a4e
-
SHA1
3567125f9a6b744a9c0e35d30568d3176237de76
-
SHA256
5d64526b7cab2f70f6b2d30ab856b0d79724b35fdcd527cc09172d050d6b9325
-
SHA512
87b6236fe7833c273ee62a1e3015b46c53733a52cb37582e60e9501127b4f4c3db675fef1b8bdf9c6cb47d1a8163900456ce39f53bb97259a30d8a84d7216012
-
SSDEEP
1536:SVbUG8XSlp3UyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:SV4X2EyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000004e3149cd0f19c7319e7c5118e60f5739c2f297d65f344d5041343933a3bc0e1000000000e80000000020000200000002141272d0e7790d40203492539fc8977ba96e956506758fed2d3d3f5ba7a2ff32000000034dc75693d66083641095b93fe1e140183518e947807829edfba654536ed25f2400000004852a3c2213242870b0917dfa424e32aac178a3651d5d9e8874ed38ee6ce646040bbed5192b69c168b4942024046aa730357cb9be5232ef968348cc1f8ea28b9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1A2CD81-764C-11EF-A073-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887565" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 704294b9590adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2332 3048 iexplore.exe 30 PID 3048 wrote to memory of 2332 3048 iexplore.exe 30 PID 3048 wrote to memory of 2332 3048 iexplore.exe 30 PID 3048 wrote to memory of 2332 3048 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab8197da4badce2e638bde075b19a4e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5759f060d0a7882bccf348c6be4dcdb
SHA1c5cff7cab64c04944bc9103d24e7f888d9e8b99f
SHA2566d80eac12774fc2ebaf7459f5c63a056c3aa742b32589312b9fb34d4786f4db1
SHA5129fbfa6164011f3da78df94393889436addff3f1dbe40ad15e2e594a5efc1a345add8eceac7bae4c0db7d30f919d40a689e79f5e64a8e69bc452b8257853bf4ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f50b0a6b5fe90da61728cd8e2a7f7c7
SHA16e0a43f2a071f1062d321c4b76bdfddeef50e26f
SHA25668a88915fbcf624e5cf0a58b67f1f04559ac2f8ad019ac66fbd805265a5a3e68
SHA512fe31be2dda1339c26e10764102de03a0efcb11e33108ba15c605384790d74f73ad1dad14b51eb567d8dde0e63c8c107a5b4911376333676f6ac5d27b8da73d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55590e17769d864e651f0a6f821377d81
SHA121ef9c95b2d742a513d428e4ab6fb95a3778d4a4
SHA2566df3f4db5c1920ca986162769f2c7f7322535fe6136de46efac1ab77fdb18a35
SHA51295d8ff07a11abd7faec980410dc598970b313fe206a25b13fbe41c170a0fa96e680864446d3596874c47638c2f0138fa68bb14d61d2512cd0cc7caea05848ef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca665917d90793f7fde2b823f6051e42
SHA1703fcae4975e8409e1625d1b7634f3dec1a31997
SHA2562907c708c20c926b90b470a3cb50f79e29eb106c7065ed8c339a43441b608f67
SHA512d84263077e01b9be3a0a7a6b41775413bc8384d54cb3ac15d0a4efaa71922bb91e06d716eaa6f6f7992279c70150f843616e4583f79a4dfbec1b7c18f16d65f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f129442e0c3f6fd11e4cca3a2b3bac6
SHA1ec315a48e540f8ab6aff3fc31b05c5ba5d1a3110
SHA256cdbf7ae97615b39e2d2fae4f6e9be97d0148347ceeb50225335176d898d15728
SHA5121fc2c092625d7aad08703388dfe27a03e73c206041db0e354fac30452cc82f1d8fe7fbf2372fa7ed00eaee7c6770147a97d593c83c24ef1561949c0cb88a06c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee44f25459879477eef33d22e2febb7d
SHA16c5d2e78e895ca0c2d456c04a5962afefeb839f1
SHA256db1763945eff89dcd46825fe537cbc50ae3dfb6c71b01cc793ae347b3f48ff2f
SHA51258ac10602b84ee06549522cd65be8f98ffa9b4b56e4eb94813cc9d9f177117aa8c75c1af40bc5b45f46d2c9385438ea9ad91f80a6f9aff80aefd32650b7b4704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5998482fb28af08fd0c0821b34f33f897
SHA112203ec75df990a065ee1be44dd9d4a31a54ca86
SHA25648de64e4aa700a7f9986fc61197ee0d1291752513a4b71aef92b32f86448b66c
SHA512beb028a130edae64e08c871a1bf7901735ec83145b3d968629add1e79a02c235a2c82166ca1773b3479d1a48908e17445efcc123c7ea27ae0b2543c923e40762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d20f48309f4778561a5a7ff2d038fd50
SHA19b281dd0b70f616bd79f9b815a33c13861e58290
SHA2562b4750d25a0b03f6ae0a0a185fc7e97b795fa7134246fb6d7efe6562c4701637
SHA5127d9847d7d3297de9f68e1dc2fa2b7bd77db0f1c08bdb3fea0465f47ee09c147a240e6fe19869ce6f3450f847ce60255dcfca0cd3b05cdfe6b654085703747767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b522d624ffa9c52180c7e755271721e
SHA1c12a07a3c9d768aa035f8e406540a7309b6c2f47
SHA256e680a11c6878ec0ef2ab3090042b580f60dd672511a831711fa339ffbd345715
SHA5124e192281b0222ef326133ed20994ccba58eb984ba2aa949a8e8969e947ea1c14b1fc7d671f21a40b39cc79785364b16cc8bc47d210005cabdb479d6890d8c391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ea004719810a629980a77128df85e97
SHA159b44e3fbe328d5d011ad072857674efa80e9a93
SHA2567de136be42aaefa998e4d3e34af9b66753c16e6c403663437496ba880aaa13be
SHA5127c33a5f9c15fc7121e3f2c58da7b877451b40035576695ad840ce729ccfe488bbd27baa9bd8c3803f9e3ffd8acd235e529f733fa0835d50ea90d200536f62585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5304cabbd71fa157b349150373a6b18ac
SHA1b0fccd282841204754fb3df2a9936cc03854e1f7
SHA256fc23c403d43c3d95a6d3126fd107a7b18928716a011797dcdc5c29be74398eac
SHA5122fc2e71670c5269747adb7a8cbb16ff26fcb460dfc92e503f5ecf39b8ee85fa368e7d355104b7b258fae2187bdf9486056a112405d741ffe105a2bb34723daaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546803f38cc7f5156ffacf6536ad264a3
SHA1f57afa787a818483dcb4ee0208b09b67ad2ff02b
SHA25606d97af72d8d95b9871594079d7731d5fe988f5a63714b17c064618b4287e5b4
SHA51213c7a1544545d98f7793f3cd4cac046cf8108f607ead51a972bf292305afe7da3c71cda67bfc23b86f967455023548c929159a3645442962dab89ab7006986ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebfac320a98bd0ba4a6cbf2db647a1e2
SHA1608550c5f7000a936d734fd712ca1f54e2b040e0
SHA256af2023c9dcd7da6a638ef6ac74eb5ccb02d4287ba639fbee4412fdfaab2efba2
SHA512e45f9e55673d446a6b1c9aa0afd9cdcf65a2a549c311d3e16d6368dbd1d94f07de5d6f8bf7a9c79ea9f41b2513cb0f04b168347c930d59cb3cc4d02e11b33884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5011fcc115f3ffd4caa04634510d2a7b0
SHA138cf0c89708a358e063616b2239bf85071d6be54
SHA2562e65a6e78d5f15b324da292a234c556b9b071ddc69448ee8872397040c97ea26
SHA51258f4fdcd6475f48ae547b756fcd43dc208decefad2d2bfc81998ee966df60093be00ebdf7020ee1ee31f3b8d14967d5a7f1e95500a494c017153f223ea9efbb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e8f7d4ccd688b0ffc157807aaf75ec1
SHA12c95c5bdc3f2f3d948f559d884c89572daa80617
SHA25681cf7a955b72844e7b347285514cfef9bc4ee4063f7592c4b5a2dfc968e6eac7
SHA512a7c8000604eba2da8487742bfdcb2aed970f7b2587e6615397667c2248e1d90f32ec5d064a994969fc4b796bc1745e43fc048bf3bc1dfb474bc7efea99b9d954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7b3c12f128b759464eb7fd627d1380c
SHA1f707a0e9884f6363d73cf8257c0a640b6e70b7d2
SHA256b011db7188fd5f2bb58df3c51d22ecfc4ad65ab47041421ea6f3678bf611729e
SHA512698894868f0f1233315db9f0c3178004df5bcd6a10263998541e2ff4c0cca0afe28c5c9d1fcd4649f5677e661e3249b6854c3fd90c9bc948082108e0dd2be380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5214198fa7af0420dd283525b37ddaa50
SHA17afcc31b22ece4791e83def6ebb2dbe3737ca551
SHA25663d8a12e7a3fd4bd35e605e9bd13a047bae86184750008895eac3bb66b269ec7
SHA512190c6bb4eb9c63d5c5d873e35ee1c407dd3c9026949383d48d69897cd7bc961022883621f6459ecd4c55e72b4b60ee0b52d45ca0d50fe86e8e42120419b5f75b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ff421add4e41b102d239843e3553801
SHA1d1e7b0d9c4c24418d5d88de1fae4af3fcb47a152
SHA256aa4b7efe2f7a8994b6b3e3380134a4f1640a3c90b53a1fc4b523e1b027172806
SHA512423b26b248918d08640ae8794123d4bc33b835d7d88f4205e92690d2d55705e968e0422acbcc3622e053c5a1c5cfc4ea11385216781fbf6d0539076620681d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc69256e7ae8901413bcb3201242d013
SHA1ba99a7a1b04ad2b45fec9d484a0d57dec8146488
SHA256c606bfd49f82e07c3c0d6628fbece2d8b69a572f077f5ee69fc7c7d9dea3c48c
SHA512a7236d1c809b83902a3d59f3d70459ccec0c47940b10734a750b7c5c3ac359ff44c471e3fad4e11cebe1d5fac14dcf51915c84b32a98dde8c855b555a6214284
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b