Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 05:39
Static task
static1
Behavioral task
behavioral1
Sample
2bd93cfceed57b85e4e0a8180df92511_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2bd93cfceed57b85e4e0a8180df92511_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2bd93cfceed57b85e4e0a8180df92511_JaffaCakes118.html
-
Size
6KB
-
MD5
2bd93cfceed57b85e4e0a8180df92511
-
SHA1
0d6907c7592daf9e7e86da8fa3eccc71026d9531
-
SHA256
a3c1beb28465b225fcff411f69dadcd2a5bbfa0da7677fc9d4e8eed03d514b09
-
SHA512
0fb68484ab0993aaae5b586678bbe67ad3a57cd63f19f213c7a129be28237689eb9c4e8c9b6c9e4b4d4e5d4c2a6aac9f65559a7147761511594a0e723718f36b
-
SSDEEP
96:uzVs+ux7SYLLY1k9o84d12ef7CSTUAN/6/NcEZ7ru7f:csz7SYAYS/n4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434652020" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f06d69c2651adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008ea0e3b97ca91042992ad51e684252420000000002000000000010660000000100002000000081c81120f93cde2b68ef05f338b5ee9629da89b33ba4ad173d2264b9f68f285e000000000e80000000020000200000003e1276e2c5307fa58e751991d64801a4f3f1c8f4a68a9bdc6c9ebbfedded380c2000000044ab5d63da088152e419261bdd8fa6076f0246d4c2ab72316f52b33009f8c1344000000008fc7cd2d9bd678f6f6a5c089854a336f80f5e0124049055bd7dcec176de982301ac1732d43418c2761db4aef26912c49ce96384674132872dbe660742a7c315 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008ea0e3b97ca91042992ad51e6842524200000000020000000000106600000001000020000000f5a5d5634e74f04a41c566d3bb90057cf9e96d835bba74409fae16a9c5213b6e000000000e800000000200002000000013f3acbb79f1ac3e209b6177ff698d55a7de4689e6340939f36752e002daa94a90000000ccdcd285fdfe8282b103330196081214ff94c8157abe41feff19db3cfd46896e76375c069c2b9a92c264a6cd64ee710e00900ace6c83716e683df7fc69e9c2c56ea3b050392f8f1074087ffa812307c0a555b73e96e587d089972105ba054e19db84249a93ff390c1a98cf2e8e9154a73b16a491b86d2463d43f25eda7d07c2601715d856f0b31a2af234ba0c4b6ff4540000000a3941a039c51ffce32076db3d6cef775f6bead0785fb30d3c3357d0d723c89bd872f5f6176e1158671cfe7414764134ac0f2f9126bbed35a09d06132b094e0b0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D3583C91-8658-11EF-AC2A-E6BAD4272658} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2376 2184 iexplore.exe 30 PID 2184 wrote to memory of 2376 2184 iexplore.exe 30 PID 2184 wrote to memory of 2376 2184 iexplore.exe 30 PID 2184 wrote to memory of 2376 2184 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2bd93cfceed57b85e4e0a8180df92511_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59841668aeb0070c6891c59a7b2523069
SHA1ea82c7958b7dec3a1f7068283a2326f93d19dbac
SHA256e1537571d04bf6dc7be3063f049eb9ac56aa40869724ef0f68a518d951614a46
SHA51273077e72607173820569c87b90f7f5096c15f04d6fd3f2f7fbfd72732a62d2ada7d47be6095679acc5fc961c51a7ffca9cce8d43e23d5592031713114ee2f7bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537363deb6c1f3ce842c0014dcfb44c64
SHA16594510fe7bf475031b272f79920887ea0bba306
SHA2568d47b5bbb96a0367a7db483e8ac2c99c8d46ceaef5ce777524d295c64f7e3edb
SHA512ea2eb167f7814818674a1a7877e333ef75192c5603bd4d53b7f08fb2a126b25b38098731c62393d0948e6fb3c2821a5be87fec246b0d5e953a28af01148775d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54268ad9e0d1dbcf1fc234eb0ef5e394a
SHA1926c150cee8fd2497572e46ed240ad3e562f6453
SHA256f9803b0aff17d9fae71a68484e5ac13fb1236833170462d8b5c43b79c36c9447
SHA51219247a0e4157d3c6f2dde5e2ac93fe4509d33019dcdc8fb5926efa6d9aef03bf8cf6b79e10e7467ba495a8e6317430fa388416483018bac4a0bb2b6d165b81f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c3ee1a3d9a667890aabe2c8d1b3977a
SHA12e4c5f4363fde8eff269496858dfcb38b66a64e1
SHA25678a9cc29aa8df2967606e3ff54644e28def5afafcbf5b10b2e67c0b25f0470ab
SHA51223a8bbdd016e18b913a04951b3f941dec7933f910c0a554bcbbb547b6c6c798a7d29b2d90bf2ba9e56539f771c7069dd57d25672acf09099b2f70b6590211ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d0f77014344d14adb2b4b158024976e
SHA176e657853efe1188ddd9c75dce9b8a502e70efad
SHA25674c7c2644c6ffffff87e7fa3a3798d11acf83cefa40784fa6cf8f656d6aef962
SHA5128c207fe1e0acc340642f3d26c12868c206d1239e7261743eaf5bf9b40348cb5dfff625f78a46feed059482ca7ce4e870c7c416e2b4ba1284deb9f7e1d63bf26b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562d096c50fc46c69a506452764734435
SHA137ee6ec22ac4e0eefa99d6ce5a60aa3cd55901c1
SHA2569940bab11c6be511f323d51c9c29715b343ba865d08ddfbcd6a6cfce9c859242
SHA5120c446091318d8e21731b094452af8757706e29ed9c706ed35effc782764a5e214ef429609b30b4668c145d8063335fc4c5f9dc3be4bdf06fdfb9ff87dfb8a779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5add73815b409bc4e4a94dc9002a7025f
SHA120477c809ff9f5704af9b6494c9de728a6e7d0a2
SHA2567c8ada9b86e702ca45b588201355463b10a06709cf4dfad7f9f9fb137c54c165
SHA512ad53ecd73aa91594d5b25913e3277d86166a1a724a68ccd9e4ca9f3b1de1452b4046eca0e99b555a7124de77624fb0394e47b8baabf3ecb2b4c20088429e292c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5832ba47d7ac05cad22764865c977a7c3
SHA141edbe00d3694249d58ff56282c1da71d77d0374
SHA2560ca53234bf045c22a23cfd129ac8cbcdd3729d3cdeffc5601e8b88df2aa27932
SHA51201f7ee96a8c05573913b2a74702e8d100aa2ec0c172319355f08e49a23ab849c245629f35b9af236c08a3b14928d048269c0878ad37481427d83c927deb35f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52366a247797bd071979574fa13eeb951
SHA1e502fdc57703ae42aec80826eacead5d31caafce
SHA2565ad2c0e3697d7fdbaa48ae8c8cc6f7adf0181ed2bdc75825df163baea69f809f
SHA5120e1058abab3653f5d7cf7e9a45da1b31f161f719ddeebc87274f9bdc3ca6ee429d3a8e1d7821715d73548a221cc97cdafe9c2b5518d9d486797a8c2638d0459d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da15de22a8464093e0a42e52273eacf
SHA1199d5446e63aad7d0460c2dd0a68a533d77d24f1
SHA2564a3c75645e310aaabc244897b0c448287d5645bd790df0dca4d067078c2d13d1
SHA5121795d12e541d67e5b54e37b772a8f506e24957ea4172431f8d46c56a563b712bc8794e053ab2469c700f0f71da87a28384e30c0fb80e136ad4f515d3b82f8aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faf4afb6adb9f0307a94303b9d8b6473
SHA103ec8a38cf2310b14f0ed0a5eed24ed1831ac913
SHA2565aaa2caf795047a36891884dfd9e0d1b828fdc84d901931355b8a5f1e6d5e8a7
SHA512344d1bef0bc662441d746f377f40ee780d892a89fd25e76d11d4fee2d38445ce02214cc6361d915fb861055d976adcc9cbcb0bdf1ee0c7f29b9d70049c55a97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509eb6d04b384f673593d2d0ff772cb52
SHA15f9d1b2400051c054c4bdd25f31f0ea6ede1af66
SHA25641969168a12141ee9ba04fc9d7b15b6af1b3187c8f3bf5730f88f5c6926b621a
SHA5129afde961bac4901f9b77fd71576c75736315cd427705f48aecc2a37ecbaf94b93945f55e8da015473ca37de4ab65d506e94bf2ba3fbfb7943b10b3552a9b3caa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cef28a4724fc2ccc486ca79837940db
SHA14476bb6cebae6f45e9a36872f0fe30df08c36dea
SHA25659a61e62ba226c89f9c39b6c80775648cf5f77f482165ceac1e2b931699a6db8
SHA512d49249cc9fdfca22b21b58dc3c41f0aa8519b9cafa88946dc9876438bd1ffaf6846b60ea6bc8bc912c82fede67b3d7f907bdf76f311f6a83ef4756c2524feeec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f384991eab98bd24c0b920b524fa3045
SHA18fb86bbb554e3e5ecc83eb21e5bef99167635e27
SHA2567558005affe893338c06424ffd3c75e3d42ea32934ab17f3cb97269ad6e44d83
SHA5129760a9eeacb197fd2fe63b7508602ea77d4a238f58593bc026af5584a8461145388c923d13035a2900a5e9253f1c6c9d6780d7e99995c32b10ddc637808f1bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572522485cd1684b890abc3552e957d38
SHA1008ee8c26efe6f58a90c4926b2d5cf457ce54eae
SHA256afc5277c9ad47335f28acdb7535a551c1628bd22ca8db67c968e9b0ac7f5a9b8
SHA5123b0580ed6722ef651ef0d287e18c73602831dbe73bae742a41c02457e8519a4f9803b878bfab07b03062ad5b2d969c570ca397f921f5148728f19b67eeee1901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d8010c9d99e23ed1d5575e673e466c5
SHA1a999ef54b22eb83387633a04c175522171a547f7
SHA2560bb2f2dd87d6430a211348fc508050d18626b80e37d6f352b0030f278a559fdb
SHA512bebfa5bd9a3277d81e8c8054bd26b1373d437b308ad9faf376cd5eb903747a0e9122686c0c1b8e521f0f1fc06a475d7d63dfa4ad9661197be4485912f362b62f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f70f18365cd01922681feb8ab3501cbe
SHA183cb9e8e0568b2843e157a2c056becff944bae31
SHA2568b34db16323d4f97a492472775d28799a418ce8aa13825999462e9636a70f795
SHA512779819745071483cd8214fd614c553876ea9b090f302acdc77c6f9557ad9305d3d020659f5a9fb35304de2ea5c18a327aeaf410b82550aa87c02ffc75056f346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559d24cc0c3d34b37e65db7ba7a198e5b
SHA1b10cedc25b671017dd0e122ca5d69bdf2f3b605a
SHA256b586ac95b002ae991d0f7c237466029c27a8cc6d460d045a80afa18fc6195a4c
SHA512fb797dd5b04495a81e4064604e83f855840800f7d8e8ab00396bc6b994e32fbfe827b053063341f3298ea141f9a7cc3c7a0f8fab0404bfde9418692ae65d1cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaa41da2b1720b2af2141eb2d0a438f7
SHA1a7953b217f64e50e3345b91a103e1739d9925fd8
SHA2566949668a91ab94fe24d079b1e0d5f3ce8c9f1f53968d2b35c636bcdd98e88dd6
SHA512a865390f20aaeb4c85b2c25b86ac8fc0459d07f4766d559c4ed7c6445713e01e54a7e41325fbd6fba8662f5c1c174995c98e2531ac1a0c6d09f96128b2c9a2da
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b