Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 09:32
Static task
static1
Behavioral task
behavioral1
Sample
c890963955f471287832c2c69cfc91f1_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c890963955f471287832c2c69cfc91f1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c890963955f471287832c2c69cfc91f1_JaffaCakes118.html
-
Size
13KB
-
MD5
c890963955f471287832c2c69cfc91f1
-
SHA1
41c34b4def7a11efb4244828c89719829bec5605
-
SHA256
183ab3196e351ada815f5c5c62be6b5fe5a0f59ee64f044598a54848eb56a9f5
-
SHA512
756d769a5b4281c5b0b5c8b844499177fe0e2b7b5a66857ebe56dd26ee27cbc28e1cfa118087dce91d0d66607d0fae4cf7583511b6380f89790d558cd767706a
-
SSDEEP
192:HVHU3lzUSzK7CXmRZNJFHKtHEc6uW76m5G5OAxZ2nedjWAv:HBU3lzUSzK7CXmRZNJFHMHxNjWAv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{90D26E71-65E9-11EF-A429-7A64CBF9805C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70242268f6f9da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000024b63a4535b51e8e0d10323d2099265c5a7d99ed7c30c38cb6dbe2a1035eea21000000000e8000000002000020000000f03b8aa8ae6d127376b214347aec1c30a8f0b93a73f09263262053aa69fa84a390000000f763f89a1d950fcf04ae18820b2be522d34537407d899557815c756693b4da9232e826b96799fc9c54678dbcc3a101242fe85bd538473afd00eff1867bb5555ef901d25777691c1c4d9d978d54fe25739f41a45cd5d60dec085c0dac5f15eab5f5b2a980e0c9f70332b5dcf0aecbce0944a8b0a13f82bc085db27ac0f7c26443acfe96356e200dde8779c3ac248d282e400000009879d9d0349fcb9cfb146d5a7a4db11d22528016e242f6eda492324020754eeec65caf0caf08b4646508ab7bf281d32568a93eeace23c41d70c430c41c30ea6f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431085797" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000e8e9000236f8adff69282b683d7da7abd0d91ebfaf7c7b33796609bf8a9eaa50000000000e800000000200002000000027db5313a977a54d30cd350f9c73b3528470b5685d9b502dd4864ccc11b72203200000001197d169436493cd279230a2ec6fad83525ba5eebb0d5ea601bbf645aecdd13840000000dd2173f3d31c2d04114590a51a7d3bca18c4f9787e07e5bb89822ff4f1fff01e9215bb5513ab3f6e6ca2597b2ef330162c2765200db24e7d8683c1c18471dbd5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2776 iexplore.exe 2776 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 1964 2776 iexplore.exe 30 PID 2776 wrote to memory of 1964 2776 iexplore.exe 30 PID 2776 wrote to memory of 1964 2776 iexplore.exe 30 PID 2776 wrote to memory of 1964 2776 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c890963955f471287832c2c69cfc91f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ecd71b3017d25a9d2c7e62a3e76c932
SHA177e9622cc649dd0c7b7ba6f4d457c3b78113dcb6
SHA2565aa61fae0d439b390e7fd48876279c9db82872bf50ecd8ed07855e41de5f4d91
SHA51228160c14613c84f4e6e26c9bfad53aac49c9d20a43aa55082ca92596d51fe421984866b5971752398bafa422f5f06effe1c6c6eee6d03b5e390fb678849e440d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530d7ecab058778fd75b14c5987dac22d
SHA18f85bee0fff5f847f949b0917734a064cf061a4f
SHA256ad8d0ed551c756c19d49d99ea674fb1efa3966a325916e41ff98cb98d6482cbf
SHA512988d6407e34395e3cdd81fec69ffad83ec12bef63e1cf3d5e38d4926012149a1429b8dd2c5b33dec965c5cd215f5bf4b48db9b5fd4925c71e5f9c82eb3a9f2d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57db25d7d153dd2607886a16d3efb3f62
SHA10e3c7c52c1b63eec517520a88f78ebf232be6771
SHA256f0ba755be34824338d0a84a99af8fb5d11d572f580eed7be2494daa751cf751c
SHA512f82b673c83ba51323efc98aa3b5a7ff074d15df439799eaa80b83ce29006433beab9e98ba88412523699c9ef4eb6e7832e54388d49702cedb9c7740fe6ae2935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530dbf80bd82cd55a7d5f77ab7787f40a
SHA19b682b27fac8d523ed9448b540f667e3fb6468c6
SHA2568b41b5ebc484b04b483756f562f77e23dbdf507ed8fcf298e25fb2c3889a9a3f
SHA5129a1776391bb82376a3949a22bd40a7c68c366480d5441ecfd9c895b00ddb8b1fcf48b33889b944aaa5aed44ecef3a52fa7bcfd1f9a29de8a6322702baa72b61c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595b34804d957e379cbc50c18321c7def
SHA19a75de271e9bbfda45b9c88feea7832802f213ed
SHA2560f9fb82bdfc276913826d998976a7ab43491072b48e5884bd644434dacb1e7f1
SHA512acd4a8b5549381d3ef92c4645d24e00d59e3578f5365704ab900be41acfe116a61946bc1fd0165f06a0542d890935093693a23152151de2d77d0ac42ec726398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5e1bc83147ae17e1dc1ddc5831d5c93
SHA1a152d3e6889267e9226bababfe64c200d35c8f2b
SHA256054166b76ed152f181253a9b84c83a37ea9af0c7071fce5e6dcd43d1a9cfb88a
SHA512fa44f0666de1753a60946bc842cbc581d9796acdc5ffbbc549b7c78340840dc3b012559d46670dd07e4580b2a113ae37c1e92e75c5777709d90cf6c31b8d6db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5182ad6a09b748aa049d1b8493d6017cc
SHA147e161fdaa89152d25b086c4261dd93f3dca23a5
SHA2564bd6584184dc92b1e64ad6469d9afd7746b880e1221254ce7ffa473b4b994c51
SHA512297fa42bb4b67fedd41cf73df22b96193414253899d38978942fc0dcbea844b0a76eb51a93df8f36e991062f09c41114227058804f317d19d059ef59a1143993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f16cb8eb11356003da3cbfb7bc66acaa
SHA1d7ee0dd8a515a114044d2c27862e1ea5f0915aa5
SHA256598f4238e06d5f6ba71ea1792a1a19ad9523b2ee11f68f2cb064d4c47f4a17d3
SHA512216c170c0f1946e9d472c43eb4b7033dbf0230150b2b259d66093dbf0c07ce5c66908a2d7860d9f127a12722c05f27374faa48066c163b6c3a20dd11ce99bf73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516368287d5eda948c627f4d4d048f5e5
SHA1439b7f27feb8a475ef9bac960830d714d076baa0
SHA256abbfd6987cde33a229eba185c07952f9fbc4db488f8e83d01415bc47df38f1d2
SHA512b96e2e323849f65f62f17eb3381ac79eb0590b34eef7bc29a454f91417afd0dc5ec5f3b923e885c9b447ff64c4a5198eb7cc7bed5c5109570b2cf8c59c72a2c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e3d511f3a5e53d84281f660037b7a5b
SHA108e4065e74e2ef807f5795f828510b02a3d2f32f
SHA25600e57517bc122dc3e85cbed65958d512ae789f85c9bc37d2acb27f362e754b58
SHA512714d0fd297c4118b2b191e54236225c3dce2b621f7a14d9b9da20144483c226fc5f68ce180d34b795331f45ded4f2ccf1c45aaae5615904c86bc5d17cf42e514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6ff4a1ca13d60241c72f0dd1289b613
SHA16cdffce07f6417e5dbe1b4ec6a84a1886f7ed08a
SHA256623e9f564167ade6380f91bd9d5956808e11a3e77d8b83e558a6819b92b01ef8
SHA5127791bfde3886265f3e8360846407b77ff18be155455921effd9d2702ebcad14f3b1619bb5270348c4e9b137bf3dd5b7581d6bbc21348f985eb1db8f0a3ede01b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7938dcd824a3ee6574f5e81e97e4f21
SHA1b4c8c2d6a3b73076db6ef6b7671b1d309130ba45
SHA2562d3e909fbd7152d73b95cfd56f72ab8b21d16697d793305c03f8e0312c613fc3
SHA512eb80df1a6d8f60558bf844d1131bcca8dfd6294e2f2ae57987e0e2abfeef703c91d612fb79b052403fb9381ae5440a28d1bc120e88e9c858a7d644f1fa0b36ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeeb4850f6f367cc0b595f0c16fc295e
SHA1a689fa2f7d5527083791de86b1c682de81b244f9
SHA256ba0c5ca4c675531c525694372b89a65bebdb8894afea1117725bc3f9b37a5e71
SHA51245e6f3f5301b36d9f82a9a341e3bfe31aa3c8afaeeffbacaa1cb2f1ee2312c1023f2e83a4e6c968ee2d143a4a1433cb5e4542ac14bc7fb458100e74725659110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573fd8f14f39508a5403b5fcbd974a774
SHA134348cfcbdf363449b5f73a8eee4bfb4b2353a23
SHA2561aea01f5014212d22dfd485c1ee78343bd43c89f253e53fa87e0cb26ac0e9465
SHA5122b3a4c16fa13844efd3db640057c324776dd3e31db83998030db1f9748ea1bd91522225691474cda3b4c70cc2d5d64a7677d74b70c8a8c9f3153973941bb5ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5474e9d4547bd2cc74da7d5432dc644aa
SHA1dc3f804b9dbf6651c19a4255304b83d94ef4c469
SHA25667638b93c142dd2132109cf941ff79197cdd0112d39593ab6ccfc052c68d1210
SHA51254567e3955112404223ea6cf813ed3b339aee3bf59eebda842d962991a1bbbc6d6cb6168432ace6724c971c3d4be7f6054b7ff527c92a526db4182b0f3a0aecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5d1bc502277a2dc69381859c3e87249
SHA15693065b84f51ada0a8ea66b7b8d28318a9bb6c0
SHA256bb72c017446b7a4e049aae3657bd8a0a91d3b33199c1354ef928a8a8a28f60aa
SHA512392a80fc29260a040b3ed9cabeef7074116f71c316a35696e649bc10a6615ed9784fcaaf06d5d6d4d1cb3a8307a6105ca0694fabdeca244ab0bc1dc1abf09260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51337b2d738ee7a294b2bac95dc7676f2
SHA1e5ebf65244f589fcb81238a56c61c9fdd7e5b53a
SHA256505e073008d29ccc2346a3708ae474ffc3d392a8a2f4237000f8671c8f97c0c1
SHA512a1a6dfda65c8df8fb195d1b50b27d904661a5e5f2955993160bf5dd14b522b9d52bd93baf05a327bfd2857614421aeb681742cc38c03b3b1a12de15c698d6d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb8e433293b7d6657b3e048b5e02d42
SHA1493ebd745afe42968f9020e329afaca15f8447a9
SHA256d8bc8700733413f2ffe78961fb6026622bcad54b0b102e7829a4270ca4de8a21
SHA512de0bfdb525c1fd7fcbecd4a8564cf4b7ed83a5892208b45147ec50baa5e29d93422d38004bb467ce65adc66b9855869931f3da9b875ff56fc0993b8863e018b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5174e15f00629f76bb6917f87e0ca7b1d
SHA143e47887b2b91d47fd66e551c2c4cd7752278103
SHA256cd4617231c3b4beff923d8bdeaa8c58592547bfc4ee9bb1c6f097813b0193e39
SHA51204428e34322a1f0efad055928eec01630cf2a6930a3217a2e5927ae15c8f2cb432829e69637ca3e25fd933a1968bfcd1ef820ac38a07b445fcaac17de965553a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b