Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 05:34
Static task
static1
Behavioral task
behavioral1
Sample
c84cbaa272159740f1ef71924326ad4f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c84cbaa272159740f1ef71924326ad4f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c84cbaa272159740f1ef71924326ad4f_JaffaCakes118.html
-
Size
31KB
-
MD5
c84cbaa272159740f1ef71924326ad4f
-
SHA1
efb4177a0e76e2cdfdec41c33484c69273e34490
-
SHA256
d8c8b108bec29c3f4d14ecdaaaa149bca56a4911bc466f7114a10dc58031f071
-
SHA512
52ab772bad739a64c86c98c9afe8c9183be5111a45ee41da60f6bbcd79e12fbf46d5eb93ce3a8e5e5a30f182f715791b1643833a233e4fcf29fd3b961ae97a71
-
SSDEEP
384:wx938FWb52rVsdAzqEYLDQ4fFTeJn+zEI:E3IWVZAmHfFTesEI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000003aaa876cb018ca72a4c3de1a236c2c2f978855f1ec828b100bd64dfbe414f4d4000000000e800000000200002000000056ac2d82a0f631e3441367a1e883edebe95e947e919a8fafb0db3ebcfbe1cf879000000022fe54a74dffc6fdbe0ddfdb1e2d77ace0a00fb5cace7d0d96059e7dd7139b567830fcab66cf59edf6d79a08c5cc94105c460e3af515ce4b7d29cb0d024f164003582048484671aa83b4bd527ad6cfc875cbe3eec9748caa89d15ce520c6eafa504b5ca967cfeecb9f27a60a58119e5dc8b44cbeed4a48041d83346a13f116efac3f88673b3cf0a1eadeb43340475635400000002ee292649255b3d4031d629fed699296c8fbe8044243a9cf1f68b46db27c929989f27ba666c6faa73009aa60e49a0fd70651196bb75275a877c1d2f758afb033 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5607A971-65C8-11EF-9994-C278C12D1CB0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431071525" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000c6cca58e464a80c348e0c4e917a3f7cff2fbee5e4617d49afde2585ed2eb28ce000000000e800000000200002000000060ccad67c7bc5a0f05fb1e69c477fe403d442dbaad318bcef7505fb87a82f4df20000000bd732c424102c7327f6f6d7ec244001e4d623df4caf4d6035957bab9b196a595400000002a633f960fb6713188bf83fae39ddfd8160b60c95b326ee48808c884fd6dd3bc9d38738bbe3c34b5763a2653e2cfe3f612a4e7ee40de9df7e8502b150890e75f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809aa043d5f9da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2712 2668 iexplore.exe 30 PID 2668 wrote to memory of 2712 2668 iexplore.exe 30 PID 2668 wrote to memory of 2712 2668 iexplore.exe 30 PID 2668 wrote to memory of 2712 2668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c84cbaa272159740f1ef71924326ad4f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505ddb2b74bafffb7238556d0ca7e3ceb
SHA1dadf7978eec1a176f822cb47066a637cac5e03fd
SHA25622f5e77e4cd8aa407e62d91b51ffa09b97966d7d34ff5612d18bf3b77310fe1e
SHA5128933447e62aa9f584d85fe989b1f589c7a71d80390d8cfc440b958a60cd96ca7f66545057115751069ad3a2483f4390cee5b6e707a7eff449abbc37d154b3700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549147b890f8a381ec6ed7448b79d8650
SHA14c3435652ae8543decbb15a51485120cf180b70f
SHA25653640b2ce988e74d1eb023a171bb4546546b2c3c111c03780f5a842053d2639a
SHA512c2bc2b5a6ae2d55280ead293ff8791b6f4cbb0ee8e41358e7fbf0d052650735f7a66cb071d4e1fcefd72150f267c5397836f0caeb9e7ea091885408cdaa4110a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5707fe3dfc5218734180f3ebbee0528f6
SHA14ef3f45b0704c61e35e79c3059b65412e284cb74
SHA256e6e1b949c5614ed11986bed343554cf0e29c3462133f4222db6c3b27e7eb9c20
SHA51273b8b4a3b75a4cd7175094c9a48e66ac9c87bc15481430b4e7c617036e85126f40638b731501761ba0845836d1cee176d7a8fe4bcc0450853221d3f01e17979c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536eab95401141d674d477ebe7417682e
SHA102f0c5e916682b5a3e6625847ff068ffd7158ba2
SHA25647d1e5891cff427dcb6282b9fa8005089ca8a67a8af5b4c5fd467bf5082b54b1
SHA512a126bc7767adc64a16ef63a104002d1feeffb9da422f9cf62b493174c4607327992c7989265aafac6aa14844802bd2e42c0725edba63a628e7bfb80618762a3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5141e1fd4b8e7b3a865dfd656e7df4bce
SHA1620644037a0ac09bcc89c36becdfb042748e7c46
SHA2561e33516dde4e21d2e90cde0738c043bd3e202bc359a0b4301e74ab39e35ec774
SHA512c2640eccdc7545fa64aad68ca3b9663eb2afd3eb19d0d35e42a1988628067c89bcf4aa3ded04351a01cc47bef5d0fd540b6e2479a1475d31f1b64e937bcf568b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9cd8be766e36eb0bfa3d9cfa9b98aeb
SHA16b5526fde362c67cfde247ddb52e0c422cab4a1b
SHA256fcf434c74944ccfe385eae093ad70024f2c1c2ec8b2cdb2238374bef059cfd6e
SHA512088b639a3a4ddd69b7d04ea7a856906a9dd3fd5307b215127198bf4d145dd26e08b8d9d24a4fbfd0e5c5df3ed43e595ca646e9dd9bf1772ead6c0848e2fb26e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e182cc6ff7e9b6ce163696e6b318667c
SHA1ed7ae9f233c0ec25ad27f87387d759460c5297a2
SHA25637bd008192b3f931ac1362b2fe8e50cddcfd987dc90c8054e15ab70532793d39
SHA512a5e16ffb795f58ac22347bc893556ea483a8daecd38dead46ae4c8688ed204f8b33377741ec358efe47c34bc4500cf47b84c3d1a40d6f4472f13772003216ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be0d1b628ef8a4b348d08f92ba9b92b6
SHA127f8a08630757ee376842b97d410b4cdc643dc1c
SHA2561bd794ac3e5e14341fadf6314a56121a3eb3366f2c5055734f5389a0fa5e3541
SHA512fb2f28b5de3b8b0c32037996a70f408c9d776824668e9c6f07b9af565e4a5d71eec88482e9907a045758441058649b7748d540c1ffcb10301159d10d068fabb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550504880b70658a762241e317035a235
SHA136eccca2c1ff92a15c0427a8a26d5aa7fe3f1a2f
SHA25649bcbc223ae8fd141cf60e1e1462aa7a69b28276cc1cae78970434068278b600
SHA512545d3e2f64b84fae6f368fc76ebd9580995fd0763b24782e36a6d5dc5cba2c2028060fb4ad383623a8bdbf975cad67ecf974d8fee2cf3ee5d4cbd70973a70859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577b6bad464e4c4aa15faa50037f535d1
SHA1bdc1718186442956ad76ea39321a826a9678c279
SHA2565df786e0d87fa2d361893281f1b8fcff2083d1ef29c057def1806098068f2968
SHA5129489f388e41e4170d30008f2ae0bbaede52e6b3d103e824319f07e2c92784f0b7c57de62e77849dfc9b8b462426b4b1d0e7440ffe13c1918e4180b6d5e8af5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a4a9c9301ce65b270adaaff19d6ca23
SHA185a479e79404bdc9ad9c88b66b06bf6d889f281b
SHA256ff365b35a6a2b967ac11fca0f330bc771937ef23a75acb046cb8d580560c93c2
SHA512e7f5765189b2b7c813fa8fc26be30e1bff0e3a0240d599f5e5748f775f93ede405364c7e07888b8d386f487b45476e544332dbe9a0a564ac888398158a44bb12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8418e5a674c001b844170cde000ab9a
SHA152823a0ff39d446ac27e32f88061face87b0537a
SHA25662675e6fbbfb41caef9dea5a41a9fc19ac1ebbf351ba7933ef85078590536fd4
SHA512bdbaa0463b856e1a1f2390524f67b5f86c79cdd073631b6ea555c5a69c8504bdaf8af410414d4c6895aa3750351ec2189be5aeda076c47f2255a658d34ae86a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5529fdc02694212bbcdae8eb969b7e2fd
SHA1819aa5e62388e09cb845ca213a6934b3c9d9783b
SHA256313b72f87ace0cb372352e2c5208c9a31960a40c022a3d63d4127087f569d44b
SHA51205e9c91273ac67beeb74c4052f1a1a6853218d8511d7489670ea2de6a5199ba9fb6648dee80a11589589829c710784c4a49622e0304c7e271839ea40d22d565b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb926fe4988389f01de83b07d3b6223c
SHA197a642acd77b95ef37f7de89bc7f0e60aca7fe7a
SHA256f119b0660a0d3f11339b65dde37a0a78ac42c613c776977ca2ef9e09183adbe3
SHA51209321fedbf7cb7696ffed8de845e1a65d72ad169ae57db0c2a41b2b91475653c4f13728bcdd7063204a56bf06d81ab901ac7f11390aa060a4b18e995e4eb3804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e7f4ff3fc687be072145a29211eaadb
SHA14d9f4644ddbf1f4dd152419cd7e16ec94028cb65
SHA256ea0d92a1abdf88d581ffe7e1320c9129826f4c4b92bac5d3be530ae4405d0eab
SHA51251485d6197629603366df7bbb1949f86ae4254115a266d13c1ad587df26b61ef6878a7447ecf7492424488f9bacce1106ca7f089bef878a2ff56c9720b86261c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ce573e46760587b224f02e972aff87f
SHA1e6e1b8717bc9f5c9fd54ef4d62958b31c7713f24
SHA256c86794e7846dfb1c0dc2e3790f47822180d714401961db94bf0d4b3e622eb301
SHA51231bacda8fe12d3e60209a8091a9ffe9f2d62a73471037015f1aa6eb730f0e228efcfc582baab44a8ea830378855d50b7553fb96b65c99c67ebe5ca954b19dd38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2c86ccb897bd513736da4db3ee7909e
SHA1a242d3f9d114a715a58be892705468f78272a563
SHA256e94001d4a6dd713cffbbe083d46f75bb82421db6548f6f7bd2bd7ec434408e17
SHA5120cb8e604de15c77847bf6ba907ae30b6c41dca08b255877248c20f104f8f67d42d0398272dbf4cbb46bd440f80056278a2d01d345799518597071dec8dac569a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c981e3071633540d8a4f11adf12e7fc
SHA19abfddeecd6721f21ee0e9cdc7f15adc2990fb1a
SHA2567dc42a53fc669a466b9ab608501593442bf50a54da01a2184d4fa6aae44e9592
SHA5122113eaae43da6707c6729d493684170f4cb7f8860bcbde5123b6a4217768d4642a506ae771e48fbe03a341da789b41310dd9764fab801d912ab7589c6a23ecae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51607722203dad3dcec1f0960a7ea0cd8
SHA1b4f8937f47e6733eeb4e31c4da759cd7f8a9f27e
SHA2564336b446fe311e70bffbd6c0fcc6de3bc6e7229ba4fe2361db6b25bc043ddf53
SHA5120c8902a5cd5a2cbe4d57b4335c7d4fbe6f2dc662e696fd661359189c76e61c5b9914dcfe1221885df67ee64f01a0f65c85456717f32248d987053b6a9aa884d1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b