Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 06:41
Static task
static1
Behavioral task
behavioral1
Sample
eac766a5520fc044a058c3eb158c2b18_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac766a5520fc044a058c3eb158c2b18_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac766a5520fc044a058c3eb158c2b18_JaffaCakes118.html
-
Size
23KB
-
MD5
eac766a5520fc044a058c3eb158c2b18
-
SHA1
75eb75684fff7d8f70a543017c30c1b89045cf1a
-
SHA256
f522e26807fd257028cadff0ee993a9f367b291964bebf46c148c8ce08f29788
-
SHA512
8e49d9ff43a747e8f1118dd9a986674dc54018186c394a75713a1e4f8f0198e0e868c1033b2462f4c0b2d33e2af15c69852d311ed90678e148b7f89b3a28eab7
-
SSDEEP
192:uWX0b5n4SnQjxn5Q/rnQie6Nn9nQOkEntVdnQTbnFnQ8CnQt4wMBaqnYnQ7tneYH:1Q/V4C
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889969" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B22C141-7652-11EF-948A-7A9F8CACAEA3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a09d6f115f0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000f63ac938288b434bf0a428bdea70fac9d02e0a3f4e397a96ba945fc391dfd483000000000e80000000020000200000007c7d34c02bf1e89edb12f01d60e7b5aa687a98ffc650d8aa019030e804a31ccb200000004dce0f85252e0e867b9dc823c86811a504398abbbb8281b0f56b21434f7ddb8140000000e41206a91ad101c1cdf8a96b968bdff628b8490b3342d1b978d2aed8a05ba7efb8b7beabcbd031c9f6b1fd9d03eefa3c8e7df039ce91e1145a7cca8106ad8f2c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2428 1640 iexplore.exe 30 PID 1640 wrote to memory of 2428 1640 iexplore.exe 30 PID 1640 wrote to memory of 2428 1640 iexplore.exe 30 PID 1640 wrote to memory of 2428 1640 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac766a5520fc044a058c3eb158c2b18_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b20b4930904cd95955ca74da9d77f66
SHA11664c068b8c37ae9629d049dc39aa71f0504224a
SHA25628eb3645fde582dd86b8aebee8eabec15f1d0977253d817834dc1f9d5e71e07a
SHA51233c79d07d81e200fabaaacfaec8dac217aaf9a0c510247e15c404d5e4d651a7adef429f53f763691935b817f4831007e978afb9967f84e3729e795575924fd0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bb64d455fb3990f1b06ef554cfda258
SHA1a54daefdabc4132a1bd2c447ce312090ebb1e8fe
SHA2566fd59fed1003a8c803f672ecc9ce4a02bf3441cedcc2523e45d8e33d04b2970a
SHA512ab6682d767986c3ecda15423249a32897e3919f3c4e4ea04e031bd79abb6b43828c2675bbc7b4e4a232e86f212f2a1851238fb6532836723d9132a790c2440fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6391695bc87106d3787c1238872119c
SHA1e9bac07992804422733921c9568eb97141d2c950
SHA2566653a95311e4d07c6b99d97de2817fbdcc816f5b0bdd1b52afeee0212e9fe5b4
SHA5122585d1ec046f0c3eb7496f94415fe018458a1a3d4654e7bcfda2c0edc1bf7fe3acb56c0dcb9b762cb8902b0dc9668cf4cf473584f2cacddb4cb6f686b8b73e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dba224b2c61d8591b02095671a0bb605
SHA1e68ae5f544ec47256acbaf92c535f4efda48e952
SHA256cf88abe26671b24e96adfa6c349dbfba4f0ad00fcee6e61e76e725ab4e13d64f
SHA512af0c60c7df731e911376ef79b4a4b372c822698e59bcc95e03a3c6f976e2d079131d267312902e30f76f2ecdd8a9d45d1f8368159ef259a65bdb4911e17ddb3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57800fcba3825089972c1c5232c426c6b
SHA1c39f2781f47099feb69d401b115f85253ed7ae02
SHA256be0290edf4909aeea0dfbb074ccbf40a4f8c15e5989d9e16ac150522d93d720e
SHA51263c9358dfc5c293e5d910af8a6f8309fd747d58e7413420ed68741ddf234aa3e89c2decee05dea3328a6ebe22e64a1f3b815b1398432bf3576be674a023539b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ace7c660277cd8cfe9b489cc8b74261d
SHA15ac3c34bc9c69ae2ba2fdf76a0fad160b7529f28
SHA2563ec07a1fae2c6dec73ce69a409a4c9ea0a67cb60777b58124218cd9aeb4570a0
SHA5124775617da04b04f62a30a97d16c597408d5753fe36626631c04dcc73183a37eda48a63cdece77ec966726d524bc1130a392973cd7dae68b011a58aea85558f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbf5f4204ab6c844ff165c23f8778766
SHA1d5167a4693e701f33d0162e0b6f60e42abdc465f
SHA2566709ac7a72dc3b7550e40b066b09f144f9b4abdfcc77886283eaf768e4165806
SHA512d82e5edd2c813759112669e528c2a2b5e40979b5607ee99333056074d298af142a702c661179b8840994e969cfa85fbfb1e1f6a7a19b7a0e490a64652ef47db0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58540bb898712470de3bcfaa7f4499127
SHA1c12a816c20944615412aa28161cee950d6e5d70e
SHA25677461991e2af0034d9daccd97146c518f8a93e0c8c82827b0361a0685516230c
SHA512f5e03fb106cbf8887b89ea7619d3fff5d5ef716969a00582f595ece2d46c9c6adae5e56cb42bdc19f971973622dbe052b18cda137a29f1d44b2892505439f2bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b27eba9b555a4e4415d6941cc95e4824
SHA16c46ac296b9b9bf97ecd9550a2d4339492368081
SHA256b11d47c55e108721911f8cafe07eca0ba39965741a1defe86d020ff1d2de47f1
SHA5127fcf4c1544b2767182f6e48406e60b1c7afc56eeddd3a7ee8f6c92bbb9020d073a2f4a8e3801943732ad0064f5c3ec57a2ea0fa383f4b061dda76efae5f12d6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5949a188d991aab944bc5dd5fdb002781
SHA15ded4cefffba057b7926a08b1d48324589ae9a64
SHA256735edf343b5f629b8d9c84c9a26502c03f53bc28eef4968fdf1cd826ba276678
SHA5123347a57d50dc086d3da84b441d2a67701b6f303fbfcb1650043b8198408e2e1415f83ec9b6cf11f976e2bd2f971e5d84a0df92d043ccebb1070daf396a7908d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5175c2d5fd89ddfba25586debd29b1109
SHA1811253ab9da058743da9b25f79ed9f1ea5358f33
SHA25686264cd05af0ff746575bf6f5cd3570be8b513dff2046933709b430f1d641512
SHA5120cfb7387c73fbfc9be146da1f34dba0515359834fbe8e993a72a3739c4eac29cfa2b9b89c0f9bef1f84d434d40a382e2e206318f234877b935a796004633ecc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57487459e00efb09b165624a6839ccf17
SHA16cf1f44af07f60460ac1303c66b80115801a17a4
SHA25622e5c3cd8462c1c0e98009e89bbe4e95fe4cfd3e9edfcd581f26d0228eeec82a
SHA5123d04dded398a35c231a33a9da2c84facfaec6245555ff53d0958b5493ee2014cacdbcec51ba2d17195ef873dccfa856ff3ca011b73b43cbdbf9749d820c2fbfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5161220e234dc7d256984839e50f8b576
SHA13bb8325ba220cbfede012cf5f1660cd201f48f24
SHA2563828143c69918a63c779d879fe2b8510bfa5a2009a4961d8a59596ea2fa0c2fe
SHA51280f6f63e566b0c876adde557dc15f6c857c0545f3c44066c11b13ba9083a3ecd005490e780aa62e3934737b79ce2e753baa6a40cb1b7eba83c2bcacc1840970c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdf9abf16502a9c675e4535cc3f951fe
SHA1eb271acc5d3aa67641a28148244497293c3bed93
SHA2562fec56553638dd2e001fec303438c2b3b71cefb2d8f3fd6e21cc44a73617e5b1
SHA512a6640a9f9c38d5168fa3830667eb9145c0ca73beb83122d92204d97c0b260722509c999816f174f10565e2cb9267b67323aae1ebbe0ab3bb7ee89cf10a29184f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a112490206869316c56d195ec1058f2
SHA18822fc93d9dfccc636870de0ef0a3687b46996fc
SHA256109d2158b96c9176108e9f3761c46cbac319932f705b85b7a99abce0256ab09a
SHA5127566b98a9a8b97263ee78984863b15f5d8b858e7ca0d1a7366e9e73b0550bbc312056587339aaeb7f9b870523799bb742e99da27e23e48be032943f4ea42bae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50af04631b6a60262fa3e6c3be00ca0c4
SHA1fc6a5489629463237ee49b22c798e81cf34e88a6
SHA256120c85a31bf1efae80503ec272ffd6a7b05acbaad904235bd7e09a9608a3ce5d
SHA5121887889c93d1e8d61916e26e6b5c6a38ee6873eec7fd74b2a99017947d705471d660f0337008e5f0f3a298c5074abdadd93c328ee295b5a46bbccf764969491f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ad44e13287e7ac3f770169ea7c7d319
SHA1cbe30a15303696954f833d587d9ec8914781d6ea
SHA256bfa3a615df49cf044d649865b32b46a34b9442ea0eae682dd89156136c1ae77a
SHA5121a2150374bdb010e72d247503c5b8d60fb7d3a89cb4e75c27c8d9706ee18cccbfdd86718b1545eec09c38729a13901afb79a108dcdc239a8ed4919074e04c11d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546f94825864d6fc098d57b6faa251e00
SHA132a7bc52ef003b5fc4977b54d865cb0b3a268904
SHA256d51d77d10db07b67f03282e27b98769e48a480eae500f8c10d8e007cc6c3e144
SHA5124eca9335b91bd11a56cec497c478dd2917f6988c3c9f2e2e27f3eef748edc0906eeb865caf8c0f951f17e5150c390a5df3987d678ec40998f74f29f306457478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520d55f5506fbead714352e85214102c2
SHA148998c8b825bb745d6acf99ae66646cace4c7027
SHA256ebc48d138a1c8b2586b3f9f5f921893322b4cf44830f52f665ab719b6b2d2100
SHA512afbb6a96729830e3543431cfc6a33cccf6055cf80ce9813eac5760da5eea8cd496f0480ad981bafe4157dbc43e2000ede641d1063e379b4debba60adf6a0050e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b