Analysis
-
max time kernel
139s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 14:31
Static task
static1
Behavioral task
behavioral1
Sample
c90312034a3aa96044238adcb9482a67_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c90312034a3aa96044238adcb9482a67_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c90312034a3aa96044238adcb9482a67_JaffaCakes118.html
-
Size
160KB
-
MD5
c90312034a3aa96044238adcb9482a67
-
SHA1
facdedc16119dd16ee825627db7fb90d40c92931
-
SHA256
458cf25e3d2af53b9ac8547cd02689f6a1f728c5935937bb7dd9da0b7e63110d
-
SHA512
830fe6c5ba8ab289e7f943ebf13f71c441e50597e233740e8e63f52064b46641910d4030e71a950f18bc90b64f287973a8bcf06e82d11ecdee75ba82bd0698e0
-
SSDEEP
3072:S6V1y7KhTEVnvyfkMY+BES09JXAnyrZalI+YQ:S6nhg6sMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2093f47920fada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431103763" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000007166010080597831761523f137fa058194e2e04d0117f0c9e496f5f050c5d2a0000000000e80000000020000200000009160c53d996a699558db7dc6b8929af09ef810afb230718db8450d5d831d875420000000dd4a4e16318257b74e47dda0a5c1b8787609fad49376be0a22e8acfd16f085be40000000a3582da43a9c0e5a59657b0bf429dab15846f9c4c3b5fe906ee408bfa6e71692440ef655e767dc33fca485c3f73838673c31bef572bfc0a341d5f57ec66ecc65 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{64C86081-6613-11EF-8FFC-DA9ECB958399} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2536 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2536 iexplore.exe 2536 iexplore.exe 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 1540 2536 iexplore.exe 30 PID 2536 wrote to memory of 1540 2536 iexplore.exe 30 PID 2536 wrote to memory of 1540 2536 iexplore.exe 30 PID 2536 wrote to memory of 1540 2536 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c90312034a3aa96044238adcb9482a67_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc42a60abe87163c95270d5b5b1d00a7
SHA1cdf38e56ba87dbfa2604cde6e54bdcef08d38e1e
SHA2567bf27698218289f0ee8b4ed1cd90fe918b0bcba12571c9bef77f07ee12ed7b97
SHA512eb3b6ea26e6446cc725f84315e8f52e01661744fc14164f7d03ff8eaa860a375f3383ee90db443b050be07726af18e2b5f18d3e4fd2b794e080b8df70925435c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517d715b28b8c3ba6664b2e93c8a70e50
SHA1d60316b040312f862bf5203d782aeb70b932e1b1
SHA256fbcd70daddeb60176583e0e8c3a9f6ca6b3b89afe36cc6f12b4ea03858e58a61
SHA512e3a0d8d98b1a11c1f133568163ab782ee105fa14c219db9917108fc802b4c0869b8fa968b2b2d160a8512e4f5ac79600200ab6e799cbb5b44125a8eba69d8e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bd8e7a4dd9d30efd2e04ae5d373bfcf
SHA1fa27b3b49118fe0d6d02b44bbc471a890978ae14
SHA25681bc380d99800eb9296c3126b33def6a0ef1a7a6e0e9ea8849ea91eb8325fbf1
SHA51229350b54699d30266b57c3705252065390063d0f9625ea8e4c0fd7b692b6b3bf1abe16ddbfbac3bcf09a81a30cdf1383cfd063bb8cf05028f5c0d3fe2c05fd0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7e312e6a5794a1821cd14f86c4b6824
SHA19580fa69e12a99252bc0b6dfc16f1470c85f0313
SHA25685fdd83c50059b6199e3a17fe31bc62fd4164fe103e71872a6fbb60882cc4748
SHA51246f7930f3a20596557095887df5a15b9eadfb30102760abc60a28bc34cfaf05e8078cfd25e1822c7d655cdd7d593b44f46ebf4157b3f11792f464d4e34050012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7be3c92fa57c83c32f4cc5f91d6cfcc
SHA1341c8ec4db6b48666cae3f984df8e06d193d9dcb
SHA256d3b66715079cc4f9328898637e4a244c0b0c2f9faeb9f3035c22eb2ddac0a376
SHA5124d1985a6665c47543ea7a394cc156749f7f74ddea71c0757680bfb44e35e79f5c829d55d86c77d7d69b9b462466ad4b831b27216b2cc163be8850dde06ad5978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df0434843fa30877b6a40201d1f3125a
SHA14e2d7f5f2b7aeeff96484929480c899cb1cd4629
SHA25688d802e5de12d0b3d8de56da281e7c38bf57a4b35355686998512dd1b3f40ced
SHA51297a9b8d7c2e4638f874977cce017e9982438b88d49f08cb528c1b6dea655178aa2eba89dc2e185ca5b5d84e87a9f376c2fb4c7feb96009e7a1a72d9f59436f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571663f293e3223d78ead6535ae7a5809
SHA186ce06b0a82dec55bce1f31d5ad67296c775e851
SHA25669e8ac9989717413f6cfe4c38836c9fdf7dde08366d12f1d4fe265ab3a66c3bc
SHA512267f9a6935fbf2c3b78e665642463a0e2b67a238b7ded68471312abd01cfb70f089045298933d495f2aa07292b46f22cf9562ceb97ac6aec5c1a149022e346c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3e1810b0a592d42f804116b0c9596bb
SHA1e57e84cdfcb5a7eaffbae031d58144014ebd76b7
SHA256ee39d1566d8a6fc54b54c77efc8ec416c89f73a47dc40980f872e855e2f8ab3e
SHA5129335a27d711ac84b3737008441bba5ed9733e826bd6a86e19681e10d00f352e2145d48405470dace63720c4ae206078c702d1b3e46bf4f62e0e9695ff23f80a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6da06491c5ba652560db22d6926d056
SHA15ffbcf59125b31a841a6442d3216fcd8568d612f
SHA256794555f805c7af2fbffe4b8aafb3fc4911a020533d08748e95b08dd63170aa56
SHA51227cb0a6ebde96564a4d48949411c391426ec141061cf0d8ac81d8c595aac49764f9eb8c52fbc099e1b4e3b7d5b5e5051b155af9f7a73f085531f8cd7896c84a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9d0f3ba5fdd0906423762f05e0d297a
SHA1a9a299f13ef11067f95c658726db62333fd9f241
SHA2561744996be3d9b2ebcd7e5b946ad23f63a826b8fff73abae9409b867cba1ff98c
SHA5121024a8bb9f4848303b0e97fed07e59935ae36c7cfd85646309690e266483f6cf7ea45c9728825ebc3445b63fcbe92d9c628250c271f3b5e92a4437b642702ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3770030b74ad745fdf4096293849519
SHA1d8799613f89f361118ce3be8697305ceae526f7c
SHA25611a3e281cfa2d61daf1f143784892a14959bd2b92056cb3d7c2b9488f875f9c2
SHA5127a54450819af3e82461f7dda97d6a45d151a599c8c71b20c5d6b61be9cd077b10872f1b81860f1891d632066984facf399ed7d0e28e854bd282f3b4db53efcbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517a7d2ab11209ce8923797f2232ad717
SHA18536c01e62c63b91de7e6ab317cf07ca888d79eb
SHA2568cb42fbc15179b53338746e057bf422f96ac85ee781caf6023ed2583751ba16d
SHA512cdf1f54ce9b833c742fe8966b32b572dc5f6a9da6aebe5a1021491b61498b3fc574c727634ec4f92706b296f8f95f002051419bcd8bc743044e2e7b565a71537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fcf25814bee822c83c825b2956d6d2b
SHA12344bfb7b105f306833efd2f9cdbfcca9a126372
SHA256a76e7e1b8fb358675277cb101f080906aab93092a0818c6ac021dcdbbe2673e0
SHA512e68ee7eda31f21459bb6e828510806e54a0815f923cd1bbd106ceed12525078ff17d1472b38a425b171b2e8a76fc0863300817919dad14deea3952dc0704842d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a10025bacc6143175516a8afc47374a2
SHA1c82ab6584274c00b8287180194cb56326808c518
SHA256dd9c36ab15156d8736b2f1a83879f1ae77a75b08fa26066d5a10b2db4103ca5a
SHA512a781467bfdd7c774dd51d3913d1ac00e60e603e7f8c6c19802e84afc216f81d105df52836d2df91cdc78a5bd5378ec4972f17e6b14fb3332d1da1de38e6e10c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8d26af0a3c9cfcb37eb646b74d42585
SHA176a983499ffd86d862a7a87c25bcf0137941cd47
SHA256a95aab4b9fb6b97c4dcf3b1c6170cee137a5a2eff5b4b48677ba42691e1659c4
SHA512a7d186ecd2fa92323e47271155eefa42c08430f7503b42989641c98f35be2c5b6267e6d523bb8ff73b8f2430dd70152ed606d0b1c16e9d9ff9aab3b7b2e2243a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85cfb5c9c5218a82c3020e06d21ea70
SHA11022410316256ea4fe609027277b6794fe3bd953
SHA256e1cda711c90bc3d31d73a8d584a32209563cced71feb25af8e11643d0610b068
SHA5127f3569f0953b798fbcaf65d8f81da77bae2e707f89c262c2a0ae1d206eea731cc69663dfc40d385052555cceb5778e0884faab59d5a30bc0b108d5157d313f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3a9c0f024e7ad4727ed9f0c2c49a8ed
SHA1b2641903a1d1157413c9d3929aa9c7814213a3d3
SHA256f9b85beb67fa64bd24fadd3cbeed26375207c53a01521e62d245c5630b6b61b2
SHA5122d270550f159b36593b8576936244817138b439aca81992868a102b54d96542d2db5517803af09c34af58cc23fd52b4685b5ce43d3261be4d6cf7e98a37f8b78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540d661720362578948523484bbe4edb7
SHA15d0acb0e2f34742edf626023ef505c2d08abed3c
SHA2561f4fba3a97801979d6b95574dc39778dae1d00eb3af9a36e46cb333e66efaaec
SHA51267733a005a85f166754403563d062bbfe8e5facad678b10487b31dcedc84edf5f3110ef6cbef51324e07516d999ce3a6c2f134f3f325a51353be778c51d57afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf053f83770b6df1bdfe23c82cc0ae9f
SHA1f4ea22aae8869855638d5077e6395b2c5fec4cda
SHA2561c4132369a1856df01a979ba15248f142c3f075036f0d05cfe96e8ab6dc9bdc8
SHA5121ed9449bc79d4e10518c7cd2677c384bc6123a7c5a00a9f751a0140aa67b4906589663d9785830ec7cbb0b7b1eb851169d34117d926563f18d0fe11ec8ca371b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b