Analysis
-
max time kernel
80s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
deda63b5ec7742eef3f85f58d713da13_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
deda63b5ec7742eef3f85f58d713da13_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
deda63b5ec7742eef3f85f58d713da13_JaffaCakes118.html
-
Size
115KB
-
MD5
deda63b5ec7742eef3f85f58d713da13
-
SHA1
5f57f38f1b1e7dc0051a0172faffd292040d8891
-
SHA256
361de8b95ff53515d5a83bd2899f2b584a4e47b3d87b4b41fb595760d8b4c226
-
SHA512
e130afb4a3185c3ef47210581ce08b4d1f2f12747c78ace63b92b4094442c4effba5d66e1e2612c77f433bb44572e3523074e6a6abef6c6a1421b6f970882eb7
-
SSDEEP
1536:Y55K4NCS6n0TjWwFZ54KkorwHSXwsTEXCKIGRIIgkkcmFgKYnK/y0259gQ57wKP0:Y554UIxlX9ny
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432421528" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c09f4f7e1c06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8D1FD421-720F-11EF-B6CD-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000085a9558db066eddf3da71d7e3f5e087eff9f494d0fca01df4c24e1a6d73fab9d000000000e8000000002000020000000e8f268a19136c96704c9e83180df6895e31e7e3b6c3daf25d646d5f08a50c4e9200000002065fac29b1186dd1807472350ea260388db93dd7484edcdd3e3233399a61330400000004ed0fcf9f23c11d835f00a657f33343dd79ef49a570a247b5a4dc461e92001606cefc39702c5223f88e2ee66236b805739e79dadac3149af446ff0650ecc4376 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2732 2232 iexplore.exe 30 PID 2232 wrote to memory of 2732 2232 iexplore.exe 30 PID 2232 wrote to memory of 2732 2232 iexplore.exe 30 PID 2232 wrote to memory of 2732 2232 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\deda63b5ec7742eef3f85f58d713da13_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542a50b97cdc778f7001dbd8c2fedd50b
SHA19c6e5779ef0f5e6162d085b0d23e41c727ff3ca5
SHA256a4a37a996115d7ee658a1d68a775c99408c2b05bb372f6cfbb2f6741882ce13c
SHA51204eb28212994f400db27d4ae861016930afd3b7814c04db5b298f9122b57816fe1be905d35420ebe17f2ecc24f68ec17d49f1d5668ff89579dc0b42c4399ab7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3035cdf53b4df0ea46e717785e10ecd
SHA1aeec3f15b522863b0e94af99a26b72d5dd4fa319
SHA256c17a7517cf3c0e3c3c2f1b3fa1ee9c8bd2de2d90c2556de18da5ed35025b285a
SHA51233cda45a1cd9e879038c7cfcd945e57f4a7878ed0b897305020d88217072f82995b5466dbdb79a24c82adf54c56a9d00b4970d6b1d450a519a487eaa8798de56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a84ef4571c922c158f9e5c0d8265e2
SHA118b2a4f40afb9cfef233b61acc9a00dc7eb427af
SHA2564cb1b62dec1aecff058995970b422e6cd91f7f7c0b15993c5e554d951dcee293
SHA512d7384548ec7e82481bfed664eac74a5740531baf6691fdbfe31f83be13b5cd969ba2f8d445db7ebceea488aaa819fc369e0820ec2b8e746fc90fa2cdc47f4faa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8d7eaff9279f8df1c8e7f40d585964d
SHA196c8a53c8c95bdbb2906ff8c13827f8e36406a02
SHA256538ad98d9bb025ebfdb0a8ded1f2bff796ad936516b46c830defd79d52c54b6c
SHA5121b6758bcb06e076237420fe2ea00fd01dce631263c9d2ef95ff2882b34386c865d878668dd9ab43e1205e4b39d44c4a62477195b95de0235bdccd06771090755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5746f52a52a93d655dd19b8db4aa06560
SHA1bb1dd76c9e9bcc56f07b8a0dd320b4f2d4534ae3
SHA256f1b9a5cc2d2b6c436de9fec0a148323fb6d9496bc6dddf436e1827b15f48d696
SHA51229235754876696af39858e404ec7753f423699f1aae47faa0640407c1da2032f921327a13b6fa502722138b222d683c8d0334d2a01e6ef96122cadbec9d19842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5249f1165c07a4629cf217ee87adc835d
SHA1e0d4c892e299ce755bd02b4ca611cf66df35c897
SHA256463863f187f78d29b1f6bd766512019921b0cb3feadb386a7c24637b02b893cf
SHA512ebc93a10fdf344aaa81dc8e9565b76576056ff5d0678968eaaa8ceed538c91d2991b7d5379e3b82db0ada998b62ad6840f1dd7c60bb75fc784cc2abc69df7f28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5376ea5a826510faaf58d5996bb19e870
SHA1b131607200e4956d4728acdf88331596189d772a
SHA256ebba66fdf77a95bfd2041df12ebf8026524078ab62febb8667564c8fc298044f
SHA5128520164be9f59bde8292d165becbb58e59e7698b2e69f65c9854d00d1126b688f508221e8104f8e0e486196f0b6fe1c6566204830322cec93a371bfc9d68b9ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a7e1e56b1d5d204f3de2ccbc31830d
SHA1574d7760b3ce699a42b648d619b2c520a06455b7
SHA2566f3ae89101fbdb933bbce33c8e1a9b14284af224035d1b753412bc0c9390b4c2
SHA5129cb2137cbe0d8a4984f1330b025e44d3f54af86f02063fbbae7c8b4b010ca236c236a2fe8ff3ed4e7d67f4b3b19921b086c539dc65046e911d8e0e02cf68004e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557c04cc6db8914a629f4788fc577d5af
SHA10c93a544be09acf4bc8d51bbcc430a4e05f694c2
SHA25626082f9f763601bcd4a66165a19fbaa8490920a9315d0504e6a0f2f3e6d7495c
SHA51239f076b4609dc219dc79deed201b66ea403e57a8aa7a916e90c3cde46a1d2260196d0697030514a0346509675d1a80bb0c0e0e2c304599f6bb8b927183731bc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560f573b5a56cd0c2c91280fcccdde995
SHA1430838a45b68519501bdc727fcbb5ca5192f1151
SHA256a79de1844ed8fb6ffb5f0b784a5f30dcfd6b7e16d6cb242c7aaa415acd2805f8
SHA512c1aeb201ae5889d4127eca6fa258c9f108a62ccbb5bfd30f1cf0ea9664a2ed747b0ceb18f1e3cbc9057d60caf415999fbce9b1a5e196e7b09c751d778fd4e235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db6b48c54797ba077e44282d1fc27cd8
SHA1162c977ef896715cb8eefbe9d2c8215e28ee3b0c
SHA256be8da07020a22b4d6506507c89fbd8f3fb9192488b28c806e98b1f47d89309c1
SHA512bb72d0dc77b935bdce2671466396c03bd04f81f8c4cf7480442ee15a48742aed3739862bc9cc9caba6bde5dc3a726ccb17d0694850ccbfdd4fa2d7d4e793136f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a96804b4fab3fcff31d9b1e020810204
SHA13693b8301725c00210ce413b4c98c617883482d9
SHA256debe5848bf964cb726f71609abd50ca2938383d35c06eb61cbdf115667f21663
SHA512e3587dc45d22ef0af2e17a0b10290948cbd71237ded3a9f5616dacaf3aba4f203773ed291a3f1ed79d57042cb4c1c066f22ca76b1b7a781788c66e75bc18c66a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f489db73d3a6b41c15cf776444837e6
SHA15c4bf5edad0107b016d29770a2c1afc33827eb4e
SHA256c0cfbe8f12906719e4b940adb4ba7323d477f4335aa6d558d4ea2987c2ecee62
SHA512e0db6b0f512907fef24e9cc108ed37f1e4c4281b183560490e259235747cb9c598b432792303c8027cebe6c39dc0c0a6a0970549a3ac3b8b5b67c8e65f6c39be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3c0a62d1f1a63866faf4db3e451aff2
SHA13ee7f719b86a00b57a26efb295c7e9e860c64ebb
SHA256a36c7db86a3f28f14fcd459bf50c01b500d63bbcda1f0dc2888732c897f180e3
SHA51293798132303bfb43a29b651e975c17183f97667ce1339565ad7bcc1af167877c2fe70decf8ac0d12e4521832b446dc22fe2127478fa6acf331bea5e567e4a9f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ca83c1366fe49afb125d1d12bd39fef
SHA173e89de599c066dac68f104999d35e49a085bbd6
SHA256eb630c0cdcf81a7625ed5e6c3bae1cbafb767f5a272764b10d5638e71ae14936
SHA512874faaf6b0ae854844c7211435c20563814babd4eb7d0deadfa060d1cc25d6694b398bae36a3d04c608c1bcca73638f722e8c24c2e9ee2bcaf0a9fec45dd7601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e35dc569a15ff51f3b20f36b16444cbc
SHA19f22c2aa9f6c1010d3013680d90f943397662f81
SHA2561c1d7ad02b9f2a0a2dcf727acf66fbc144aebc9c876581b82b3e947713ba39f6
SHA5128f26df7ceeccd08361dbeada064bd85d1c209d254686b5b99da3eba35d155555623653f18f246b61c06229726e6ebb6ef2db744bfee555d26a8f84d5a19cba72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8655e13f5586bab1a77e7dcba893607
SHA1b261583349eadb923c2276b17a6ecd162f195314
SHA2569ade2547b75f8f3b19e17a1f25f9826a87a6b36a88cb68926d45f048245519ce
SHA512e2acba190639fa8ea8eaa12ebc32f8a11565f67627429b42d48c716c2b8b0317692eec7fe5042203d674f362c372f3faf57f25656c316bfe636faaaa7574993e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aad8c978be704ebe34fb074e7dc25c0f
SHA1dc233181771adeb65eccb30d89c8aa5aab92c4b0
SHA2567304dc6d1f01f7c7247ab91fdf66495696f8f6758efe77d7f36eb63ab8f173c1
SHA5121cd5cfc9f957af2afd05641baffbf86d44025b0bb02fd354b423d0bd6b39bf8b8b19adb250f223836c8070648724ffae8e309c296ad3489919aab1e728fc5593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549d07ac2ff501d99035cd483301b0532
SHA12ed5aed56df5931364617ef74a9be9d52e9f66d0
SHA25601ecade77e3e6975e4379932f2e60311e4d768c816001e958899701dca622adf
SHA5129c231544cbc2ece30ee8524c43317e9ab76de64d3165968d12206e4d104659987ea2a0ca1718859dd4a9d544d435d405e4e2b68d7ba95227650b71870d987b45
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b