Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 14:33
Static task
static1
Behavioral task
behavioral1
Sample
dc6dad557c339e45cd91ce3802f32204_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc6dad557c339e45cd91ce3802f32204_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc6dad557c339e45cd91ce3802f32204_JaffaCakes118.html
-
Size
72KB
-
MD5
dc6dad557c339e45cd91ce3802f32204
-
SHA1
4c07452f607d91f81e5b7d3f9d68a4e2fffd0e9f
-
SHA256
86c01b954d4fbdb69b748a45afa403e2d74bb5273b80858ab56d0b2260aa979b
-
SHA512
f2d9eb035a2bfb8dcb9290182da7f9790542538dc5b7d89cc361441772ab1e9beee128588c3691b45ed50d305cf635099f0688789a4d29a0c276f9003cf21aec
-
SSDEEP
1536:2Ube2ft2HM5pUoX9tsKYPFPdiN496hayGPCryZ:2Ube2ft95p3X9tsK+FPdgAPCryZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e39eda2005db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000a876126685a76cc42c43a0e8a8f8f4e25674a1f72b53615bd39d472fa5c60357000000000e800000000200002000000068898cb539eee1a580dd457ae511952c822aa3c1134dc35a37efd6ce21a92b0c90000000aa0848f75feef328d0c41927c3b1fb6eb2153f3a38610d732dfeccdfd6cfd72e6e0b198105c37f2212c2ca0f15e18a442696245d6d46c7c7190adf398fb6daebd5b4aa157466a806157f52cd8ebdbcc88f48f41c8ba5ce818b8a1818859c6811fd50b214d2c931aa484cf497809a64171c146da197ab82fce3104f1d0624f03aa4a40f731c55e4827187da9be4e4fddc400000007e9a9683d4c1f4ac434b98f6eb6b942ab83263d1d86e9caa24a51ac52f1127e39d967999190cb9f3ab163e0ad354f19674bddf37de5311949b319b590bb9fb17 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05D7CC81-7114-11EF-931E-C28ADB222BBA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000084f152db3cc19c2fbc47910295ae8bd7a6fc514a87407547f8940bbbadd36e2e000000000e8000000002000020000000189300633ec0ab95b75f65c42c7999862e16baffac61e2f24b48f764e7502db120000000fa82c854205505909b4b87a40c58e817d2ec6df815617e568dda86bae9f222ef400000002517bd65d7e3b02c3701390f235729a6b6a01e946d2d69770e6c05cc3f350712bcd11174191f0a0200c1441885de31dab0ac9d3f74ffb2c84674189ad3543c65 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432313495" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1152 iexplore.exe 1152 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2800 1152 iexplore.exe 31 PID 1152 wrote to memory of 2800 1152 iexplore.exe 31 PID 1152 wrote to memory of 2800 1152 iexplore.exe 31 PID 1152 wrote to memory of 2800 1152 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc6dad557c339e45cd91ce3802f32204_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540eb12426c7fefbe79f78e10094623f0
SHA1f7a0ae19c8ce2f955ca11234c76a9badd0bbbe37
SHA25622c08ea0795f18d9249fe80130a3fd55dbc292116c6f444f7c83f2a896861ea5
SHA512883c3b1b070a424d18ba16474d7510bd8dbb2374e389c870e3c39c4a3f68dd2986b02cd2ae9399522651801400a7fdcfdabbc55bd0fbd60b714819211e080591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd73c22c50f5c71590b1b70ed9b594de
SHA13164472741993bcda96c4fb28430db8e28214d17
SHA2561fcb6ba621a8626052262a9b43884e757e532df42809b8e3d548a72c9689e3b8
SHA512347e1149a219d5ff4f04df9f8304c745aa23c07228e1dba1aac2ec65530cb45578a6d5e6d34a3c58a678e23751a72da52c42bb52890047e345a3d1a45f2a3307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e00c36e71844990928f99d2aff9550f
SHA1b1fdac586f0f934c5e29d2272e0d93a348a66c3e
SHA256c2418bd87bf38a59e89cc7ccdc16076d0f4244b894597725b98253e4d5669834
SHA5129ad71009ff93ad40765cc2ea49bd8856101e12096a6f94888919f35a15574c4a1525795874fd77c7f29cf101148122a8c2978b45a4534b94b56466ff509c2b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524af4ebfe9e075171a514651c253b822
SHA1408dd2e826b85d8a00e61df5fab47ba88be08851
SHA25606c0d5655abf8a655225ec4e8eda0c1fd71ec81812b441a922ae87003a641601
SHA512dc2a4b85fbb218cc1a9d77c87dce92284d837a83c8fed2c119c403613123849ac9fbddab2da9325f9557b61421cbdb7b61f5372aa2205822b104f42356caeff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a513e082b3a59c8946a01a977b167f7a
SHA198ac949bc813db3fb109adbeb628b8c9a5fa2a19
SHA256f9c40fa8c8235ceed82ca140d4957f38f4890b1d7358a716d4dc8486b99ed7bf
SHA512ce6f8bebd39895257fd62fc9a4d840ff5b540431404bd42bbbffd103fce6154502f6b543052ae6b5e82b0f68399ffee73c915e47cdca0972bcf8faf168d0c8d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5985a0a72ed5445487a2a1248b073ad0f
SHA1c967bb1cd579dada761aec1d3eee8787c4fdcce6
SHA2569c1e49a108edbee3589513316e72a8d948a5b68a6db8af951b88ecc36c38ce83
SHA51261c85143e1953044a79100c5c5a920258d7ad9244bdfe3e597f3ebab5e00fd15b2afc10681c6b20577311b06dbfd0f6508bfa7937759df2fd7d6592163ecf938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595e193e32eb8dfa9f7284cee316f5c4c
SHA19b7e2160a4b31a950b1d89a8f88269f261a19d91
SHA2568f3c4b22e589107268aeb3fa28ad21105f5bfd0a14566e7e506f461989b721a9
SHA5123069b0a7e9024a0a7e811891f6203ad4627917f3dc3a1de51fb88780200b2225990a364b044a008821c645b8a574f37725dce0be8bbbb1280b361c728b737893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa44d4b4e8b3085b5b56b09d17d14b42
SHA16ab1e777902f5c09ae2148ab1ca29448a4110862
SHA256f0088362078106e63be3424dd2906af646dc6d2a029ffea0d2604b90368225b0
SHA51243ccb1033beb7223fc21dc698d4d8112f852223c117b593b75f6a38a101ff0da7b7961717a17cc45bb8e9858d51a78287fa8d35f472d015d2aaa53e20dca505a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503a226a9e840d5933524725d0ec58a14
SHA143f4da5b13273c288572637dddbbe5bc0a5b1a33
SHA256ae90c21466a4e5f65855ae049495d902a5c53475a2425af8afae6cf77ad8f0b1
SHA512ab61e8c9471f0334901a48c39675fc4faadfd8827d5e8b6113146ace6fd964ac577ec2ea4df397e2389a40896fa9570c5b8c768c62ef1788ac25441d6623b060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5373517434079718f35dfc82b47a97156
SHA1dfc631ac5fe442f532ccffe34ef049b8436443cb
SHA256d743c24d3f080a1c9b9adbf452b7f2460f702cc8d4a6c4636b08a930530c1932
SHA512b3765fdd11401af5237336e4113ecb68c3d09b7b6b26ce1f636b1d41c830fbf980c6c341b3d81fc0f947874f53154c691177e772a8fc06cdef358639134e6f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f748f2262510880ad33279408a2005b
SHA1839bd5f0ff13b21f234cb6e4022250763819dffd
SHA256a5b470c403a176ab1653ab29df59555f10f3fbd5817e11b36d6feae5d5d83937
SHA51202588a750ac1ad9209a50a5c960bbf2e4c685d4507003e1f7bff68c8e0401a38bb07bc0840612d4d4653b519be81ee294ae36105f0eaae48ef0e04c790637437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5314b47e931677c5a1cf315d51ca758bb
SHA1e5302307e8df14bdc0f37cd119a5144db4ef1e93
SHA256b622d7e4090fe652e211fbd7fed0acfca6c2237977a7403c47b913ae68cba9f1
SHA5124f0644e6fbb3293d70a74f5af6aec323a46c3f0903a0664ab75390bf8e96fc7de5803d1c0ebc4c738a9933cdb8549ab64e1c92f68e77f4e2a3f59583a4761a1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b0051b709cbd5dceb89c4ea6a92709b
SHA142c65500dbfb8dd2d9391448c06ea2a9d4154a49
SHA256282d1690baf95d9f6485457a2dec60726c8b0868e19e526e9e22655b816ef546
SHA512e2a1f2c75945138429ff5482c3c74a182f0b78cc1382ccfb4d8d321a917421a9b7dde6e94abdf34fbe1796091a1bc2ae39052ffbbcdfacaaf8eb7ed7872b7094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5841788012e5a557e55c05d78a1dde9b4
SHA1a32563db8fd42e3d9054bb7477aa01f5069c99cd
SHA25653010d2f8bc4925e909d9766ef63d5349916b8e743d941758e40132fc3c70e91
SHA512a89eb5ac44f8a9095e923ab756d29492bdc4536f1ff84aec3d57a5ef23b1138d1db8a058e1d0e9aa018cf6668378fe17e696345145dfdf381d4ecb6602a92596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563ecc3649f67ba4be032ebffa0f4e8ea
SHA183b1dcd1e3c4775d0a06d854f2507cd6e3568c35
SHA25637db6cf0666e92b4a7293f5ab30145b15c5a091036b440fa3feb1c09f5ed2ded
SHA5125328b7a449135a574dc6437f2dcdafe25941e0dd84e29893a9f81aa687b7215a1a7c61383bb844e6ef3dbcccd6ffbcc77ec7df50cf03970929a4d4c4de165701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50385093efaf95ba9fda096afb49b566c
SHA1bcb38824ee1b922e81b70abbffbb8b3fe0d57be6
SHA2569026e7f563c7be9f958dbd0bab2e6f543f05dcfca354bf68b02a70abdbec4904
SHA5121cff10679da70acfd7907623e8631996c9827feb1dda4d92f4b5432e92320b4e7966254082a79c10e8e3c51975b1a691de42af362c155d721a63730f53c185bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c88af67a2c3e37e57632a5c162d71b4
SHA1522d8b5888c411be595afb1485657a2a4ebcd314
SHA256028c83b02626bcab7b98c389af1fd0580dd980748ec3bff9db7b085463eaad29
SHA512c9110b94b0bae7cd76060543e7295ea420fe27d2d7b13f979f5af339d13b1fa8acd3f80baca75f67dcecfba4b07d33d743f65fd7775abf110c761df71b41d1b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcbe731d7ef63f937a83a9e8dccbeb6c
SHA100c8e83e0639ab840fe11f3b8b0222079fa39a7c
SHA25671cdbb1eb6047bc991df767d22bb9e73c5279130405bf64a385e9fb74c48858c
SHA5124f382c71fa329f3965b52911893ca002503af667fbe4ba59ec5516c9b9ee533ef4ebd69f7437d334ae4b866f60bc41084776de3cbfda63ed712e357184bcf3f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eb863ec9f1b9b4cc3f6619d968ccc40
SHA1150ed9ec7f1f66c5655408f6ccfd7c6cd98ddbb6
SHA256c555a486b045ae7e49078b9ee7bb33d25c63e200edd4e96af292e354e9b58adb
SHA512daba760a7188401f324a6ea5042fff0d0cde2df094c8efce9a27f8901b11728f766235c31fd6046b6376d149b1874b3f61a124eabac3d7dff2da0aa130e8aa6c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b