Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
f0c7f8a73eb0a19637b6f78a8f425e91_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0c7f8a73eb0a19637b6f78a8f425e91_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
f0c7f8a73eb0a19637b6f78a8f425e91_JaffaCakes118.html
-
Size
4KB
-
MD5
f0c7f8a73eb0a19637b6f78a8f425e91
-
SHA1
74109e251246142674ff6b4281fe6df624ba5785
-
SHA256
90a04b587c1a4fc7ee1c5dc18e92b4ce635909934caa9fa4213e087b17b683b8
-
SHA512
8fe2defedb69541b975573abf397564bd1433d9459321d50c177fc9bd31a304919f13eaede3d8842119a9e03dd9e83c2dd02484bc7794ea0573c8c952f166b78
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oNUTLJd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000f30ef83816f1d0e04658b720e3368481074ac1d3f9383ca784d1d14e418e14fe000000000e8000000002000020000000d1cc1ad3c5adf5c7117c8e31d605ca3d8f3f67d012707288f3604029a8dd92d620000000f7d80f20f7559019a3e519173d752f8cefeac0b4c5d203445852b6b28719dcca40000000cdb9c7b509e5d9968a853c868e939e54aa381ebd0aa214f8c23fe1ff1d493f5e19b9e95ad11fc67515a8f82ab443701dfc8bd12e4918661f3136d4795d68685a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f211c7790cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000005608cd8d686dc0e767baa0bea9608bbac59dbe05ef02348950f4cd780df137cb000000000e80000000020000200000001386bea33c35c58e6cc62145cca19cba86cf38f0c5c0ee7d1929281a71614ab1900000009932fa1cfa8a6b4a578a4e2251794a592f93e24aecfdfd1b3f1da189bab6379e1c56b1edf6d2ffbae20090ef9da6b87ec3a9929c39967ea9af2ff13f188437a12783b4b5cae3032407205ecbe3f4d6e04749d250de550f3fe7b955aabd02a48636565f7f3c222f6febff0a4417fa06dde32de5c5e57de45e164831ab988a8eefbf0a78aa8e737fd20a291c3487dfb54940000000aac7359210bbf3993979f84b45df6572d72f8e4843c4c65d733ffb843d9ff0b6f202fe1607c2b486c4e8fe85b5002cdff3cde17c4fff4946cc0dd5c69b137259 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433121347" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2962D01-786C-11EF-BEB7-46BBF83CD43C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1860 iexplore.exe 1860 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2532 1860 iexplore.exe 30 PID 1860 wrote to memory of 2532 1860 iexplore.exe 30 PID 1860 wrote to memory of 2532 1860 iexplore.exe 30 PID 1860 wrote to memory of 2532 1860 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f0c7f8a73eb0a19637b6f78a8f425e91_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1860 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2892a003dac0c06a42208295a3d3375
SHA1f82445d2054d89c2ca20fd461906789d36a1a2bf
SHA2567047bc13559186273f1fa4401a932e4dfb1d863f9deddf95fb090f1a76c8075d
SHA512f4f92c84fa7e9f1341152af77fda832309b741b09e3547a4c9742c664cff8774610f763732de170d6ab286f821730d2076553982c76b96a049397491db75bf77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a7f00c5eb0052484fb0c40256127d33
SHA1c99f67ce684012828663fa0f307d1d7d6689c026
SHA256c3e7028d85f3d0a2d21465c6d2be44b71225d4ef4a9cf29c0f20fb8d5ce87c16
SHA51239fa99c2aef3a67b93ea7331c1256f68625d2259bb9bdb29299fa05ab2bb55c224e527cfae78405ceab124dc452a1ba951ccbc8565c6e88178c7ccac37bab73a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f30f28a3452790a9676177de54a43b5
SHA1c588f2581ebce0cb44ddffa0d343d75859072e14
SHA25616810b5e190d98a6f35bb23d1f70a1b6aeeff575350089cb8ccb2a2b1c396d65
SHA5128c5a288396b382450d1e0795d2a5a012cd7a14cd4e488e3d6f7e95878eb3c752f953a37656fb0404159bcac66bb410f5133b8bdb4c99aee772ef1a18affc1be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57142ae5f6b288384f5c6bb832cceb182
SHA19b4780104d214d37c3e4bc61a2bc3ff6cce5bba3
SHA25693a7c754d799a9238655f82439c8ed3ef207d7ea94913319f54b12a51f16243c
SHA512dda42580dc602e67d5b83f820fdc880bf4f260abf611dbe734601cfec06a1ac9ee54d07d937d5a8ef8cffb4dd88f604443c5221bfaf2c7e135cbfdb5dfd4dcd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b51620b9c6a5f5eecacd828fe27468
SHA18b9265a54e25b9f480c6ea388c2bf3456000870f
SHA25634cf6fa007d1f5e32fb01fa790fde96f1aedb6edc2385f3cfa72d7a50a1266ec
SHA51225ad152ed1e548678b47003f8b6187f19cb89a5cfad4d71577d1e961b62279aa5b66893ae371a6073824a2f640acfb360088f90dabb79784022f29ffc9a32915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542ad129d926731f34000278d5dca2ae7
SHA108b2b584d8d644f0669a0d9e8ce7ee9548e3b07e
SHA25615718f770971669d20d917c4439659822e48c98f8d4ae4cd6b55463461744715
SHA512a706315f97e503cc9ca51f579c4d55a6ca8b58d4340d89c9d51fb4babc3f4dfbd91e1184cffbf59901f55538a1d8da03b27616476b61323ceee212a5dddfcdc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2dbfc7658cdbb77bd9d73ec9a64fb7a
SHA1b50558b4a347034458f567ce2cc76ae0030f4a61
SHA2566e2f661e6822b34f4ee58625f5972530885a970967ecd15c096ffeb76955374f
SHA512a5915308bc657a58842e288daa9914a6b5d6f231373a32fb72c812e8855b32805295d63e4564792b15ec56c5bd385632093395b54d2c5ba85f4a5a8d43d71638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5636ddceb625e585e61d35a7925d37d16
SHA1fc8412e7e49e76f772218485aefe17b8972c8c70
SHA2564e9fbf888d0fbcaa29e93f15de5d5044feda665c78a37570a5769dd549c011d5
SHA5128429250833141d5b1267dbd31604f9a56a0d780226217c79f152ca808565747801c36092b890678c0125474f8310dee8a8ab129f0b2f6e2aa7198969e00c2535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f2e329db0486bae2041152a649f802c
SHA150af3622827b224da43c2671ef7b6ca80950adcd
SHA25694a71959f6671de5ca85d05d8fa3f80cd5e40667fd7542e62e7a4fe3e66827c3
SHA51200956357a50d6755aeca9310e12e02452e9cf630046aef3935b83ca6ec913d402cf214a0c6e436e1385d0c4baef465cf00cb538e93da64ca85ce02bdf768a7d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8bcd35eda6fcad285f0bc5dd2704d96
SHA127b74c99c098caf77c17afd1318225ef3081e186
SHA2567a455359086a1bb16199467880fd48063d25e51d7d2e22e3f4b53549cc3e4685
SHA512ff9db254bedaae813e4be3278637dfe51956ae71b7467338a82f9fbdb129a0532c23ef24e0af78259ca4414a97a459fe49fe24183ad16e1d490aafd0f4ef0fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f534feca5b613cd19aa81ef86ac83f2
SHA15dc5eea5ebe87e34d4ededd03efb0bae65421e17
SHA256aed7010bb3add43711a57f1a732fee428ed08e5fe895b233a57f32cbd2d9dbc6
SHA51237d283ede5977de37f1ec692ad4e99fd130a5aaeb1ef5f3e73fc8f8557c1b43fbd50520a2a789208f1f2e8b6f4b8e7f29de1ae38f016281389c9500f7f781d58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504d8ea929b4b946b28e52c6f5028e2a2
SHA191032044addf97b3d5f9f585c1d38b4665d94fd9
SHA25602afee8a5e0d4bf4301ceaa81f3797e241195b1424f9cd52ed9bed300ca29ece
SHA5121dacfb49fcf210ad374c333480067046626d04ab543c34994c1a1448c7b2a39c85ff9fde4b5c93fc34d4fe8749d674b546bbb8233e7de12a68a82fd434c196a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5dfb89e6d71e9908921c8da73fc59b1
SHA18420978e874cbd4979e4ae4871184d9ceed64cfd
SHA256a8fce43019ed77404f51a917792927d047b38c451561e114924dafbe4660b7dd
SHA5123345ae9ff24c524514977e1a60e0b5500c9aa1bfb8e73a09a391ecb8f6228ab6e6428ea7d9efd73b993a8a0cca90919943dd9a3108e51e255de7403b1ec3c62b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee318c5a60debedd764e372430f2deb
SHA18b44e135aacfaadd229c305dafe8fd58bc85a9ff
SHA2562ba9fd27093a808e3dc5ee7f3503efe447920078ab45c678a15c7de5165bd25b
SHA51265d8f6101801456accab44d70b022866f0fca2a4c62d41f72be08821bd3460fcc81611eeea299bfb4b7260c485c46eb3e8b4a3718ee8c933fa21a0811dbe69ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fca6be48c0f0e195cec3bbc736ec68cd
SHA1eb6c76fa29c0196161aada23eee500a44bb43ce4
SHA256ac8e57323b0986801318022298ed6ac2f789944a606035eeaff880b09b12989f
SHA512d580b7df4d3ddd2243f9756c29cd68c7ce69dd8f9ddf269c1b51c05b460934a94d0303f91d33f7ef91c6529913b8743097eaa4686ec0d90fdd26fa207d9645e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4f0d13f3f6d9c412f0ea9d61cf63e36
SHA15ba4aed8639487f001856f0076eb68b9849ea20e
SHA2565b36459d9d4e5441dd35103c2bd009f5567cdd5fb9e937a424becdadd21b50c3
SHA512a7b88754ca2029ee3c80108a05ddb114edc5bd93ba9761afa7a482fee83b390e27828579dc3ab95b4c033001d39e4048a3136a3f8e45488b58c8329ae6b4eb7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f21e6c5bac48663434279740c2a11dd
SHA161734360b7aed895001683cb86d3517307291d3a
SHA256cddedac37ac478791500e424432e80bd7cb3e184586d92b0fe07555e07da9d52
SHA512de0d2041fd479f9ecee71c037ba5ff0799ed5e418d292ad463c584d699c6d18baca7ac5e6aba39bc018e1a56cd8b3625ab8b5f30a11a3b9c3bdc1b00a8451ee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529e42b76f1289b8bb8cb6ef747dbf93b
SHA18e3e012d336fd36a94bb8ab796d1cc4f16520047
SHA256b8aaab1efdda11f023052ce284146d5a4a341c91df05d91f3d15abf50e7a2af2
SHA5128c18e003472fdb65d556205b6873b65845d54a5e9302d2d94f6d24e408bc10c35cf8980340d2180a53c8e15db150c86969a2a8e5e5dd3499053937cae7df9ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529f93743d6056d66e5d755e2cd497565
SHA1d8a9bb1c696a8e48118a02fd10361c7245eb5288
SHA2561db44525aec2672293123865eda2aafaf8e02500f25b6675d11c6e3168c70004
SHA5124dfc785ebccc69d9efb2c5d98445f9b9c476a96ab55ec80d1f8192d2247dc223bbc75802b506c612481d15cad4a7f31bad0e09eb42745c84e98cfeb1c69a51b3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b