Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
f0d2c6098e3e009d31ff37082e20ab96_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0d2c6098e3e009d31ff37082e20ab96_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0d2c6098e3e009d31ff37082e20ab96_JaffaCakes118.html
-
Size
70KB
-
MD5
f0d2c6098e3e009d31ff37082e20ab96
-
SHA1
8f7ef0351c14377ad9df10a58878ad3f7069352c
-
SHA256
92bcee935e5c45dabaf5737f6a69fbb38365101444770f2bb5a3526c94896495
-
SHA512
ec31c061a13ac518ec2ad81c9277dd56e02e9412845490a8c1ebfa6970c363f18e4340189e2463ef4bfbea1770fc21c9ce709d96dd872e757c0f6b58dd7878aa
-
SSDEEP
768:Ji85gcMiR3sI2PDDnX0g6sha69A3BHTBToTyS1wCZkoTyMdtbBnfBgN8/lboi2hX:JdiFdOsTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E60B8681-7870-11EF-B432-C6DA928D33CD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000000e98875ef1af23d115e3c563029785d8b7650ced40ecae2334f74a3693b9b673000000000e8000000002000020000000cadd10e4345576535ac81eb46796df07672d1589d44c50334885d73ee759fad09000000057135fdce9244ca460496869e51a7a8d82f61c820a1237dc71f872c87e511195a8c17535233c571b39872ce481f9e2a53395753693c1f0fbdc9f776c67cc7075c7f4200e6479eb224293d9c3d8a711ef7bb7c81057e9a34447e9169c8cd7e4f862557ddff0caa9bc83cd8be963e18c2976eef8cdac9bb5ffdd1c5e745592e11b1a48e54289b15e242478a2bce4b8df88400000004bf0ea475160135444b71a7ee0851a3cdad285a5fe6146dcce0a3875535006581f7cdb3da74b3dd265b42e4a279520c1e27acfccef794e04032a3aff08de8048 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433123043" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000008d2b0d6597777514e0c2e5532d63b4b2b22987078fffc088d0f29bd58a79cbea000000000e800000000200002000000031833999427718ddc867aecf477f32783d1a5f48972d7089065ed298898bfe76200000006061469923d26f69f252550318147925ae9915865bef1d9c8d59ab422d94c03040000000e81dfa0fbb10b7e7550f61b25c50cae0df595ac94755a4bbee359d24ed768f7b05bfd01be1a81eae8fe4797c01b48537c6b5bdea3bb59d548b632fe4aec6acd3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00054bbc7d0cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 548 iexplore.exe 548 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 548 wrote to memory of 2320 548 iexplore.exe 31 PID 548 wrote to memory of 2320 548 iexplore.exe 31 PID 548 wrote to memory of 2320 548 iexplore.exe 31 PID 548 wrote to memory of 2320 548 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f0d2c6098e3e009d31ff37082e20ab96_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:548 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f9aed12d63bc8582b4c145d408a9af3
SHA1b398554f96ee48340d6033927be1eec011606b48
SHA2564aadbe48a79455d593c0b56f31a2676bc6008a6d6bdea4d8b87a345b38969cd9
SHA512a701b6dfa4a10f35defeaffbdeb8b5555eb2f342658390faf295a404471fe413cb64c7b34d521019ad35def3927b3deac41fe74be9721789efcfa5f56f0f48f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5223420216f067ea4942cabe200d36173
SHA1c3d5e32f264acb5f8142b48ece432a4b9ec469cc
SHA256849aa601214d43756ab71cb5e66628eab0481a8078044b8b800bcbcef9b4cd6c
SHA512e322f4a1b7704d9158379daad1c2e4aa3d2ca3e969848cc7a0329ec9eb656a59ddf7ce96d22e03d3f983035d9ec3e2c8c677b86d01ad4097d1814a825995e680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506415075f0aee4c7d365eb81eed2a6c1
SHA120cafa3f0bcca50719e9f3328d6f0c4ecf4794c3
SHA2563936da441dee6f0104a2c67209214e05ed9aa993ff70a8cd85067d24b441ee71
SHA5121174b901aa968b3808f23b1891815cef80736258d1cb1af131285b3ccfe08b5d633961d163d044b5f6473580d34905e0913f12ed770c3ae9fcb696f8403a5612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceb1b0ddf28ac951aedb1dfcaf86a5c3
SHA145102ae4f8f8653e2f406573448d26b88d04649e
SHA256aef79792c3d757448cf34ab7a514fca7eacbb7373bf4c6e1c90c73e45463c520
SHA512bf62710bac567496c07e34f1b3d28b80aa95ae5099917bd014734e61990ef25a1d147d74a7253862d2e4e6df401ae6969621e24cb59b8e08aaaec2880110019b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b90ae1f01a0e67112c71a40f757c887
SHA1e2e52171a382596a7faaaa567abbfa4308f05635
SHA256ef38391180c4ed33ebaa28ba18987f21fae3206b918671dca7c88e8ae9c721de
SHA512259d01c41e5303a5f70894c74001587535e509a0d73086e7e9aad6e79effaab684ecbeb05837feb139c692a71e00e9493cb673bc6683ec1063af98b09c5ad111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb7d4a4a2524aec8a1f5fc251d84bcf4
SHA12cd72aa3c688a9379952a4a9809a1a7cddf42b9e
SHA2567e7eb4d1ed3cbc4909fc40c75889e0af2412154e36d96683b16dbb93765c5e43
SHA512ffbb2190fb862ce86e4d80d4918f2e31588304b4847dd566ff3f79f80b4c6e851d0ea6326ba5653a5b5f45dbc8b8360ac87fe390b19990c1f6a416d7b8604826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593a5ca3aa5c8dfcee636a6bf43f4069d
SHA1197c0a98df377c165a5fbd01a47aa0aa36f745c4
SHA25611eae56f342bdec7f6c2fc9a325d5267eb70e3894d2238d4e600064f1c39f19b
SHA51274ec715f307355fe6826803bb57dc48c93e8f35f14b562bb65dc755fa6e66b48917ab13064257884f66b72e36e875556e138ddc0981d04f86812b10da181d5d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b44f7c44274f6443f5fdf3eec4bdd65
SHA143335567da48c48c3e05898ae065b08216fb1102
SHA25634c164ed81d2ec73dc81b1ee01c0fdd5143a0ab4192270e59d2bb21083765b7a
SHA512698b3a6f1e24cff9bb0cee0d5df8391d2badfa70dc9b9fdb8b5428f3da33ea61576918b82f0154721c1a8bcdd4503d608769580042ebf670c95655e3ff6a5c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e51a85c68b1d4c2cbd89346fb5c19ab9
SHA19b2912f72d93d5d4bc64db9e9ba0abaade2611c6
SHA256f5e497ecb2d0466d9d9a1856a6b0fed5a92bb9bc2880bc2d3466f70f7abd16f9
SHA512d4734fea56c1b578832ab73cd06335fa77ad54c1b693448881c102447c0e2ecad8c6758bab783678a36a7b7ed6a5a1f073271dcc56cd575669cd956b62224852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531476583aa100f7f238778def66e5e0f
SHA133381fba78ce6f6548aac9b78d0de83942f8319c
SHA2562935c2adfb7b9964b6467e1aad5d4936dac8189c076e60423a0e5f54cf5b1fcd
SHA512dd26e42de7bb704d27be68c49081f385336cc47abff7ac4fdc92dad302e091ba6b7c4d5bb5b2cb880539572175eb1e311a493955b73322e661b4b7ae47b014a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dbc5ea20e6d3fdb75bd07a9107a9154
SHA18f1a7bd834818655e21ff1b9318178bb6edbaf50
SHA256012a3b7d2b7f56e8f37a2f60223f7eb99c624255193041f3fd3433f29235ceaa
SHA512c7b9548a1261aae65aeadd3fbce7f555ca94d51c7544f6a244c233362fd0142820b4f127d081c1e99e8ab8974605b0e935a1fab98bba5568497662ef467db18d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf0c910eadb98b6313a429313c8ae713
SHA1074e9cab9bcf477e44fc7d59fe0fbc762f8cba54
SHA256cec28ece056e251c91f967d147871a4717aeb38890fb8e8e093ea75753df59a5
SHA512bf73e70312059d44926421874d802af3a9aa378a56747d9e2aa4362478d9b631821af561dfe4fbdd91f8f32488620013cd569ed646e3b66a08929eead827afaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc27934de672bb7cf5bc777b8e7a3a3e
SHA1993a7d25400aa744c4b599a08fbcddca6c648bbc
SHA256c6993fbb4d6a7b113a54df331f88af7b16443b72d916165c8d5324f3bb6b6502
SHA512402192722b92dbd8ddb2401dbd8a4d6634c4cb33f7f7d9c102bac6973729c3eeda97bbc5f4352674bbfe77919ae1309edaca1bc0556f3888cedc5e419d7a953b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d49bb38749e1d279b04d60b76829dc7
SHA10d359e498665303a162d35940226c602519dc89e
SHA256d35ca321488f21fee9b37fa84a9b15cf034cbe99a41c288c38b86388d456655a
SHA51220d8fab3a90c4909c84e1f5846ab91253636b354e723691f1e87fbe09fbcab8ce018389b1bcd9b36787ce432b413ed1d23f199dd5877bf9972459a7cb589995a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57544a055945a8c080221855471967140
SHA19e39d1e136c7c5a4f8c1aa840b5e50044daee25c
SHA2565009aa0077adc73c691975bb0f83ac18be12024d25b7ca39182ca157f4d1a9bd
SHA512f2e7a7f330d51183e27803eb9ec7d9b9be6b945ecf67af64d7bbbb6493414febcb9968e85d66a7a2556a8e6830e3d5353a01a0062d29d428978ff73aa8812080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56230e4f59ec692cc23c306ca2bd6f8e2
SHA1e1a715343581c2a03dd30927469ddaf221b65d76
SHA256ef65432dca3a52a4072660074f6418f1ff3e42c0d267526d54d8d2c37db4adf3
SHA5129adcee6c7f4738402de1861a2218bd3e3d114bc4aea1f38fed9fca882dc8bde040e47c0c324ace9da3f485b5ba6f396d9d3a0b2f350c24de1f0ed51793825785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55091f67e307f28ebe8cb6893bb5fa972
SHA10bd8fbd8730c4c250b66f48b9915fa56748c245f
SHA256fe814ef16792b6f54fd940a67c72e3852586c5ed76764aff3e73b226eab87278
SHA512fc40314d6119483e36546110cc4d688256f7172ac24e4dabd44a1b8a8ffc31f6e52e3f5fecb78c0702cc8b3805e10658f29e715a43d652915e0f39824a0fff20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592504a53541afe5980ab46d2e2b55c0d
SHA13449e01f924657f2f0befa9787ebe9b7b9946774
SHA256aac2791f9f706e92f1b3a568943d460809883f3d88f23c43e6a1af1a3839f208
SHA512a23a72548b768b7ba76a6c88a12aff3d7b940b63dbdbeb55c00f240b0847ec09791393d7b69702799dc582d7c6f19635153763fda02cec70995e637098e0781b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a449eae6f4c965070dfeb7b899e1b1a0
SHA1930693fa78a9f23cd9e789efac9a534a5ae5b513
SHA25635012a26bb14cef222b6c64d0120a70d7f657a6463b4fbd185c7b559a0f737cd
SHA512fabaa7d1d5fb7395f820db804f6c0275ff1292488bab274017a0b8847ea3e5676606e508f790ff752d9072c6025458c238ca0e12cca117e6a9e8a3d80b487ab3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b