Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 12:22
Static task
static1
Behavioral task
behavioral1
Sample
520a27722b65442ee4e462179b201b2c_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
520a27722b65442ee4e462179b201b2c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
520a27722b65442ee4e462179b201b2c_JaffaCakes118.html
-
Size
9KB
-
MD5
520a27722b65442ee4e462179b201b2c
-
SHA1
e0be7b0fd4f672ef9c4458117601f19f0c361a89
-
SHA256
65fe0b51d259822a7a986f43bfc646009a4c4a672f7c8818448bca4612dfa975
-
SHA512
07511f2b91f45225b318d947ecc92db8d19689a2799fb4945d96dd40695e976a9427f73ce4595364e4e4dac1d1a636c0ba9ecb432e1b610ad4d1b46b951e1a28
-
SSDEEP
96:uzVs+ux7ATLLY1k9o84d12ef7CSTUHGT/kTsOOpqaK35RlVHcEZ7ru7f:csz7ATAYS/iTVUTgPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80835331-8C82-11EF-A276-7E6174361434} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435329630" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000002d3201693b0317f9648676b76a2f9e08d376b3c986c0dfe8b0c59f862d76c01c000000000e8000000002000020000000e9fe59ffd80fdf12dd43902c7ccdb44c089f68abf5679434b46b9ef6b63cde6820000000acec235815ddd16ba3773cdb7250765543588977168845d618be61347282e37e400000005f950eb1280b28e8e552dad3b71a03c84efd7f13d4abc07b97024c11c3bc2a487d2d96fe994ae9d2d023dec44ac489883b20c35ac7d4daf06c5156bd339b3a51 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000ae13a94b84e7a1aa309bb568eee4a64bb97cf4b6bf1b447ccfa9de0b58ec4994000000000e800000000200002000000019bac696c20712129777ee975cd393b9b969336317e08ba400eab8a6633c553d9000000072010bb5965e39893466984b65db84fe1107cf5a0a4fbca9f459743c22db5265f5f55dd8b2724544b6ffda1faac3f5f04265151d2a07eeca58697b0d9de8f64932d2579f0ef76bddfc02ec7a5c74c2383bb3fa966031693b92ecbbf9f6db7f97957623f35065b2a3603a33158791f1b388ce0b637036fa93b1630715535f1a4eb536941a37affb5d550a9927d3b00cb74000000059c9f1df4c4c823e0fc9b9c1c9ae69073e0325c72146ffcfe1cae746fc0f8b8d505a3b6a8c52656c065f7fcd86367c091ecdaa31e4cef3d6cce414d5f60c7456 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c695568f20db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2004 iexplore.exe 2004 iexplore.exe 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2868 2004 iexplore.exe 30 PID 2004 wrote to memory of 2868 2004 iexplore.exe 30 PID 2004 wrote to memory of 2868 2004 iexplore.exe 30 PID 2004 wrote to memory of 2868 2004 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\520a27722b65442ee4e462179b201b2c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c213cd58bb0200be311df6c227b84a9
SHA1656bbc86d27ad88312b06a4b24fff6321a43939c
SHA25690ce3c08aa979c1f33541d2351563e3d9870ff66b0c32d2f0477208a42dee871
SHA512ca59a7611d5675b5b958b7e474a18e78bdfa95fa8f54645b6fdde5a18f592428a34b14cc1c5405dd848eaf470c2761f011bc3abb0ec78ac0a78febfd33d87f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a1e0d1e6a415b2ad2724a9a8e80302c
SHA17b0589aab5dcb29086f94569c8a0b2921b2b8504
SHA2562ba56ec6012cbe900bfd89566692aaa19fac3a07bf2bf78abae66bdd2a185a25
SHA512868ee26131fba9860f93688d3bc70c423e8cf12fbca1e061f7a7299739205dcd7b1c679ca69594685970d96fe109568ac25ea39b4570c9981ebbc97e74531617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b699de08edf015f9eddacc81d2589d9f
SHA1e67df37b4cf29de36ef8e25aaffdc79d14bcddf2
SHA2560c5b5ff453b8a62083e1bc4df0bed7d5ae89e2047dd5aa7e506c129822685a56
SHA512fc1e8d3a81687feeb08f83ec4369c77483a91d99450d9a5c142f3a7c51d2c41a63518ee7f90615141c902d40ef42c3f7f3da9a012ab3d1921114397a268a6e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b803f48d9fc22e9d693862983489ee70
SHA162aec2dc37f53ab450ae1ae90d0f40ff57f0fdc2
SHA256af383d8e9ce43af10946830ef4c8a9d20c6d910fc9f3fcf6fd9d8be646749461
SHA5129fb4c1f96b61a5adf975b5c863cdc3e111286e18f2a160cd33e6befb7be344dc8b73b922d173e40649a826cf2f3a8aedd15b7f1652d245add79cabf2336d1740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50968d9cf23e58f095950345fe45d7c20
SHA1b65b6f8a0e9f6e25f28c2e2eeaa3a2490327ee29
SHA256c7ab4dbe0a3f203fbc80b91ef1efade07d4cd821ff138f4e234462a021a6a649
SHA512f3bdc04d28df8af2eb4001b5d17bf608b4359a68a19e1184cc9f9b41685bf66991783bceb404247745314bb0ae770e59f846fb0dd776cd267d28feef409e6200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a3dcbb181af8a68cd09d2a319edd06
SHA159f683ef71e70f3446699e25da7a1bc92ccfadff
SHA256ae462f2c7fec1e402bccd85bf8f749f58003cd29235872e0ffd93b46ae85cb44
SHA512ed3f63ef9c3bba6bee3235c752daef752d3303995062f1f19ba88a1bf4975c80809cc9c356818edc49a443b2ddd9250e5999d92e2c269a8249e3ca88ddf242b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e063a96a8cc06d6ed12c65fe30131853
SHA14f161a00f923a665fd0a728e1c77ee1c89a6873f
SHA256535c284700008d93a5501af1729d60578450c66b60034b9834268ce12ceab244
SHA512b8bc42429670069fa788b1ddf84133b530cd098a6467ec433d131b5b3ae8c8826aba0468bd0ff0b5c3ccca45dc9e875d9fb28ed68d940341de101fbdbef3d242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52463449f94ed2a4d398d12b86e3e0fdb
SHA108e5a812c02b4192865c194c5237e8ff1f191c6b
SHA256f0ac0d8b0e0b1f6fabd254e89a6f8b73255734e5569305504635465435d13520
SHA512ee4cb570d3bc58f483019336f3fc01235c7a884715bbffc39b93bf4f985a76e5586b49ef64f185e623f01db2b4667cd4c9cfaf70985e04c6141b185406390f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afbfc7e5ce82c8dc6fd4815ac5893eb0
SHA149db2bcc7efa152d63aaee003d38ab4204401879
SHA2563fd9472dab29852c5e3a9a39a35b5075f98edf03ddbfab0c72540af0afc32acc
SHA512093f8b7ccaa2a55f8629f0981866768c932c6f195bed421b4e43c735d32ceeb128c4c099664c9c847e579b84332366c31d729dc2490fcd1d7aec7448357c7ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50edb273e91c51067a94d880732a05845
SHA17447c22e22ca960181fc2b23422290e90b4f33c3
SHA2569c48d7de42d8def8a12a4064cd4c3a069a2d6b91a85db232dcc5d6747d75723b
SHA512a04724239d9c0b59d70879f1d5defef35705c907470731f1886d82f3d309d790b0f116290c707e847b40d44c6f05acd6401102785a00407043e238cfc62256a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551e5c98d06110e1553e124a67e39e087
SHA165b179c4f79ab4213d28c38a96bbc3c97712ef0f
SHA2566956f9db5e8aca0f5c2d7154ecf7a27bdac02a73e89677c72949cdf2bb751cdb
SHA512ba95e9c060ded388d95717ffe78543e403a22437baa9fa1662581eb0e58fd18b1f9cc2e2b449ddf33dfe98d3384f6af0495a631124aa2f7a67a675568ff18beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d48145dedf7975d3d76992d741e0f58
SHA186820824aa3bd8f0ed94a219e1b4196fcdfcd0d3
SHA256b6ae1dd3eeab44960f7f480b3bc49c0f9859baad0af6d016ea95acb4f2544de2
SHA512debf8929291cc3b7ed50fcda7ecf232fbeec9be043772ce45cfe7c08783ba1026f056c4d7a01df9aac904c1ee0df6869cde3ec0ba67b088cac4bce01303200bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569debcef2ca4b13cb7b2cb7e3553e2b5
SHA1fb21325002b7de85f17355e45c5cf42b9da9851f
SHA256ae29e0f12581e58aff41f21f2f73073233b490849fae406b4571dc613e2c6c18
SHA512e8f7be7b602d8353bd34f31b74e3732b875a92a77b2a3d829726ce61eacafc34a4632c14186f600669648973c4b9c5fcb33b62ae923c5a9cd727067d244cb9da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c8385ae012f79b47b21feb3d95c2e1b
SHA1c3a682261324cc886b0d36bf52e92aea24442eaa
SHA256ddb279c10d746d2d61d1d6b6f4d704f65631e9cf533d86cab10c85468f0945ed
SHA512f9657b2a84ff4be0d98dac4a7b3ba3dd7338790d56a0c24fff15ffb39b17344922bde8ba2392a9f174a73644859d2d4d962794f84bfa13fb271fabbe83e0da65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b93712e4423e641b3b925f7c0dd0fae2
SHA1420e610ccd491d39e3bcd42f0d45254c9a876e7c
SHA256d70a092fe520f4a2ccc0edc310a7a19d85b42fb3cfa1c401fe02fa22183ec76e
SHA512816b62b255629d0bab1e51d92f09f6e91d194b96e7c475f1e2c1c8abe5c33c7ba21a9da87584c105a89451d2935df5e78da3b4dbf3f60333d8af4f134d367dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518108c5ac978c85dda5aa06677ad2161
SHA17ea1141456ad43663d39307d57ccbc15b3a8b729
SHA256c1e5b86442763f59cff2c90e6ca3caacc6ce05ce20168cd1107ff84852702e9b
SHA512eeae25049ade6b8a96a1c33a923405d0aee56162de2934498aff0ec9afaa782ef63714bc0e8f1311d79d53a684bfe7faa153b59fe0e1a61fa8fe9af091b232d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587bf9a3abf5313ab2983d5d704d7425e
SHA106373ce98dad285ce5d7113970630afde4fd675d
SHA256019ae3ee00a4702ffe5c03886e936d6ec572940cc11f2e95ec1dddabf4191c31
SHA512ff4abcf04039acde49dc9b26f42d2d9035a930976c490d7be95dcfb3b22966b4ebe6418d420d9b076ffc5ca92d30ae7f9026199d0612c5fdd61e16da1b63e4ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2087bb178a8835516b37205de971f2b
SHA1f1d2edbc5c40bb43e0dc64e34bf390a314c4fe2b
SHA256de15ab1ad45ca8f8f226c88d88731bfcdb5c0de12908a784722c4958e758a487
SHA5128cb6c396295117a989200163128f1a45e204e26d9fa6049d6e96491bf346afd43ac65fbf7e589369718f02e49e802787f3e7760243807e6960e68d42f907ee52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fc8c9e8f43ee0373e0d340f1f9bafc8
SHA11452153913199d6ab67f18b3d4d61a9ef0b1f2fd
SHA2560d65c201f31ab362e1898503a17a546e134675f80d0041132bf7dd6c3673b755
SHA512a74b171d682fef62dbd4b7f4dd68ec5ec447aa21b24162029d803c08d20cd8e21589e443049a8f64a89a36763eddda1bdda20cb6d046bd522bc9a76ba683c125
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b