Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 15:53
Static task
static1
Behavioral task
behavioral1
Sample
a13a84a58404880d39666eefe649eff6_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a13a84a58404880d39666eefe649eff6_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
a13a84a58404880d39666eefe649eff6_JaffaCakes118.html
-
Size
36KB
-
MD5
a13a84a58404880d39666eefe649eff6
-
SHA1
bd88ee9ba610571601ec855d049c4bf1b6f24372
-
SHA256
8de6849ee4669657b74643adc0f5a2621bcf8bb4f8b693034b9bf917b5fd872d
-
SHA512
b615cd40ff5c417483fcb4717fc13e49964c263ee912b33af583fb2d868e86cb8a5f36fb71f94c64a1fa6ff59b953e58bc922eb9c88c71b2b55c4e913a1b1117
-
SSDEEP
768:zwx/MDTHeA88hARZZPXcE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TXi76u3l56lLRc6:Q/zbJxNViufSI/X8yK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000e5c49ed2f61b4b45ea20fca12331b0f3d799ddc6d90984158646805482204d9f000000000e80000000020000200000009a4006d9f0ef8827226f0f55c52281bf9648342eee3805da4bcfed16c972643f2000000080ca804bc29d78746bec4e5ba48c78563b56e6797a505d35e13a456dceec374f4000000010ef93465e9b06beacbb2d5b59b273646200c8817348f280385f81df86941199938b5a76b3dca6b8c7d5a064668fa3f394f3bdeaa369833253b064ddb8ee4c29 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424369479" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d09333c1e0bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EAB1C4C1-28D3-11EF-8F67-D62A3499FE36} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3044 3012 iexplore.exe 28 PID 3012 wrote to memory of 3044 3012 iexplore.exe 28 PID 3012 wrote to memory of 3044 3012 iexplore.exe 28 PID 3012 wrote to memory of 3044 3012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a13a84a58404880d39666eefe649eff6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f87dca938292e3d123180bb6b142c53
SHA1e7e594373661bdf4fcce854d90be5afa90582ef6
SHA256b5a5a176a736e2c715205fba254be8d950d9d06596544645b093299cdd4dd357
SHA512fccea8c433b931160c94e8e3b4893043f70340ab55deffb1ef7fcfe8f9d486489746b16d1ec0d378d373860b5f188a72124739aa97e20f9637566b2a78e5c980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a11b61c2fe6695c08348c9d176a10a0
SHA1930337c905a339e7f9a794543cb1e78cdc77efba
SHA256476e20f236ae60e5137001fe516e540b36aa6b72e25201584985568618437623
SHA512b279c0c2fb4efb0fc3574b6146eaaa67b4bcde502f43b487f668f1ad90ed2f92047394696d69fc5dcb540d0e8d9c950e96226303c2629015cf0f272711b47c28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ba04257f0500006cea9869c291fb6df
SHA15a309003d84f5098e409ef2bd670824e92b39d52
SHA2566f5ee945c8e31f80ff62b454aedbf7169e5cbda40490feed15cb0d219f5e7938
SHA512de50a48cd9d32250b4123f8129a106264a768e022ddda2f09ae38c8e0e6546c387bfa331c45e39a6c183f74c129d6e9a6fc5057ef8a5868da065117bce3d390b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d27654ce495e0e1679160faf6ae9145d
SHA14cc767497e0df6cfebbf62f7ee51136a9b920e5a
SHA256f890206a2fdd29bb86cd11880ac06baa7d00fffcb3c10dd1f168ac4199c961f1
SHA5122896aaca5dec5dc2b4eb7e83541131a89272acb5d648fe104ae4afac0753802b8aa69bd41e5a87dd82710358181e498f8bdc33dcd4f88a53aa689856f1eca3a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d937b0b19dbdf13df0b1e8bcf03d506
SHA1e2acdf7af2ffbf2ff21a02c56616df27713efada
SHA25651952624e0df606ad4adbbb284d861f4068946d9d2368d69b929a987fa6a4de2
SHA5128e1fca73dddb99cef74715b97c19e3aa1ebca3cf77c92792a94d30267542bf81dd84965626b36a729a651a82eb476753d9f2537ac300ae7971a5c6ffb4487848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598ea081d9ca1e889698c52d34174a74f
SHA1d09377b0acbac679b67af617e84ba45fd210d7c0
SHA2563d15f677cc6572fdef39b1f4bcef2980536e26d3a87e0337bdc1bb36f4e48c85
SHA51260f978fd5fca3ef5e2a6e7334ba4cad641b4e12974a3d662aa1416d1b1249b4956fe287f8b41e0cdcca3da39220488b4b26ad447f68c03c9e85fad98e1c5a5d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f76c7f79fba877e32fec35af4d6eb1c
SHA1446dd9ca9eaf3b4459c6a7e4c6894be2f4a12470
SHA256adb9ecf68146696a1aa1b20324127b342e077f582fad47d25473f1d6fa3f0244
SHA512b936840a0215f90db9c6b329b6cd9133cf420f117e87107e2bc9f514b6af556cf3c546440053fa5a475966624daadf1d7d2c6927093f88c7fa6b95694f5e329a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52163eb2017391d1834a162d8ee4f3475
SHA1973a017860ac7d9ea560ea1f44f4676b63716d1a
SHA256fee19f27e3b400fd94b8e16879696ae7e22ef1a83a3b6e5135968034d56c7012
SHA51282bbd192cbc8484bc2dcc89153d82a1eb76159d365341c3a6af7e599edabaacd86701913a1fce4e654a7ad13672928dbccf1d7de047d3950b671e1fca5427f4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a5604a4a3b33ed99ad15dd7f6619bae
SHA14cfb05e8bb6fefa98e117d715d10390cfe934f09
SHA256df1fc903efa085fe9eb8bf7f2102135001d644e3c100a6f814d4ac9e516c59a6
SHA512cdd87050082be5531ff78aa23c65cae91ca2f9649783fc3541b3e5a56712b477519f94beffde4066b5d94e5fca15fedaaca67431d595691ee208351bbad7afb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1c838ca79b5c542cac0801424fc4ee1
SHA18b159e5bcb91c5ee4616fce2ebc9bcf511ccc919
SHA2563b9bd68a7c0650ea2b5513d5159052342b5b4230524ac2d2a88b7687145096c1
SHA5127a749240a4ba35bf460d814a232653d568b2c961f097fc5a34c4ba470755e2747a474f64d516fe84e3d95a45181f2537e0b3ac4a8b299334794266c98226c251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e489114862b6a8b5cdba56024e34848b
SHA1e8b725472c64bcea269d2585d49a8cdf127d1f36
SHA256e52e5ab22c1eb6ae9e65a311a2276b47ffa9c66df63b8cb69c2166a59b64e476
SHA512da968cc1001725c3a9f0ecfbf0cfacef227402ce0bd8e88436aa0fe5cb3226a852afc0d4c1127e125d76972516af330b46b112d9aa6b83201147b89e7cb2a7ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58be4e635d7bf64f38541615ee790f2f6
SHA1b9b25c6df4edf780f299648ea5a1843130569e36
SHA256911886b19fd9d33cc1673f297088b8781aa1c34bd9c3e4b48bf74da48217b7b0
SHA5129e460ffb834ce927bbabd99641447fcb910f2b371b39b8ecf65a518378310bf9a3a8ad37bc4a9bd55884e303105ef283427a5d22dc0b8a5ad2cc03522c7f1d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c770f335d674915ca75a903bb9c3ccf0
SHA1602a035e8ce7bb8cc1a1591b52a393e1c873f516
SHA25636a7449ba90f452c39a32e90135086c6a77bb09c266f0800e482b42c613a04fe
SHA512e185ab0d61e90ddd313e8f11fdc53547fdb70bff992ed4b7b3253aec4badf7f45b8df822a62d75ffad3ce7dc9299b168a93192969f49ac600e2342f026cb4328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b30074fd43c1d867af967b445688fbf5
SHA17ae42b4bba7fb23714aafe8a8452e35c52e06de1
SHA256c2b1547b609346196317e14e0c41807ded4b5ad1d2e1f65171b2fef159a0f265
SHA512f76d847f6098e8c3407e3a44164054b9d0d429b0b619247ecfbad77b9b05e4ffa09c5d87bdec3ec6e3ba5d8065f36323a287b7ac0d806e38aea9a5562e19de27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5046b8917c5047877b3d179618a1f45dd
SHA13007578cf4359ee71c58717780fa243c5c51ee12
SHA25629193b88ba3a8672e22fe5d2d8ded9f7b33cb9978aa87a93c8d04ce5fb6642e6
SHA5126858aa69ca1482a8ee66f107119c4441a9e620f02cc492a713b1dffef74fe52315cd80dc030f494a861be8b320613b546432d2e545914514c3f839b5a968ec3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578d17979bca71e02b4b16fc9b7e2a330
SHA103de1ff8b54d60a7a42a24eb7a55ab290e6fa9c5
SHA256844bb68a1f59845f2f507d389f26a91d6db42b8a01c0aa572701a32551f4cfc8
SHA51286c1ddedadfb7d54aff2f0a1c65182af9d185553a63f5d9af5d99675bdbe544e18fbdea36c9e3ae943c0a4254ef54a2934412910dd85a2c49503b2806aef9729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578ae58ccf7b145e89fea593de5dc6793
SHA19934a14ade78ed882288fa35b6e29b89e4e50414
SHA2569022d13c54ab8118f4ff6502ac51a907b2eb0c876d4b187742038ce290d98261
SHA51247485ec4f3fede337b3bfb4b38346f212c174617f391df4d7a11441afedca09ff05a780c9134b2378538cb09e11f1a652640d1011d683aa3ada4ba493f34d782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5675b502541e748ab5a17d3aa11310b6e
SHA1efe8a612131e90661622cb6c10702511101a17fe
SHA2566531c89581ca8db366383be82f8c6ebe3c11730308ee20137336299c0ff96eeb
SHA512ff4da18e22cdad91ea4bc2bcb4989460e0c7e5479d8244f4b9bb466e0c50ef0ba163545beff04a539d340643097f89c0f03f7e0d262ed10ee248d2b020abe5a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0dcb2f15283b7c84d4022fe2dbcf96b
SHA11ca9b89cee7ae9a03e129303a3c3e8ff2f7c9483
SHA2562e3a5d20374859a8b6127359eda336db6b187983805150485d63d6d7a7cd816c
SHA512fb0acf880489e74320e4851e0bf14a05f3c0d26c2a264fe61106276b9e69b0bc385e362f7c1fbe403cab849d9b779713ff72f7d749a06aec85fe1f124c025eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e101732d896ad9e9799d08fea96c142
SHA195e108ea2031de3d06d358ae4fd1ff1a1410c74b
SHA25653d6315035770bed5993ba897bcf836238b39ad163cd420d969e9ea2a9b01599
SHA512a59fd872925058a00c7b033e0db044e0737f313d999e15163e454091369c7f51fdd2f0ca404ae8faac5a26fa77de0e1d4443fcab5aedc5dcc59eb529e706a3fa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b