Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 17:08
Static task
static1
Behavioral task
behavioral1
Sample
3b27e54f9a50f1676741f6535a023389_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3b27e54f9a50f1676741f6535a023389_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3b27e54f9a50f1676741f6535a023389_JaffaCakes118.html
-
Size
139KB
-
MD5
3b27e54f9a50f1676741f6535a023389
-
SHA1
80db2b255d984d6f2116e445a982ecfeed90f9c2
-
SHA256
231d5ce5c7a8e5b22e1783a63d872981a59de0eda80c5b4adbcd399579587cd5
-
SHA512
7ceb1daaaebb1f11da1f1e7f39c8d519595d70cc0d391de2e85876fbc99945166230ccdcd289a05e940c3a7dd642c7244a1d65ea1c886047537caa916f5cf8bb
-
SSDEEP
1536:SMN9tOpDYfhZizrYF5lUZtyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09M:SML+yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000b8bb916290a64f66a3360afc7e39e800cf270b9e588f272c23f9231c33c1ad5c000000000e80000000020000200000003fd13997f1b9fa96f87e60deebbee7cd58e00460b9ddf30e500311b906f76d9e20000000acfea808df53e777906fa553a3b6e4f9c9572848e6e7f9a345adbbe738e4c453400000008cf3b16d87bed4593ff0807c534d74a7139d7130b9aea1c4102465b50a70db4b1533bba4404af8f96231ba6e297793f742552fd39686244ff69e304bfc5b4223 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434914749" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f02dfc9fc91cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A0B0571-88BC-11EF-8BDE-523A95B0E536} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2984 2844 iexplore.exe 30 PID 2844 wrote to memory of 2984 2844 iexplore.exe 30 PID 2844 wrote to memory of 2984 2844 iexplore.exe 30 PID 2844 wrote to memory of 2984 2844 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b27e54f9a50f1676741f6535a023389_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5045b2d99a453044113338d6bdd1abd44
SHA1b9f19f1746a9de6bcb7fcee32fa23a54e383ddbb
SHA256aa5b8e1ee216e9a2f226101951cf841ff0e714803972bbf83b8bb576d6dd3a89
SHA512c075d32b012ec73261577d48a9ae00a4618963ec55d47ba25a175901b66b5c471dd96c4da0b0c69a1126e90310dfde641d48a8c82f1ddd86e64a8bc18c57a534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52daa396425ec0a65821d256a51889603
SHA1d1baad48492bd78d2b8f43daf6545e5dae4a1126
SHA256486e038ca23bd7ecb2ca4ab9283ef42401d2eb74cf5f8262130e92a591204ad8
SHA5126fe2c99bf0ffaab42b9f9f3f4fb7b5fb79de43ca9318e5e40a758d933b5b0e6e0267be1582f1fbd7a765b62bfc3dc150b5778f2e40e3c07b509b4b6b75bf3726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f81c8104770ace19c02d61dc12d3044f
SHA104c660869002d490bef57623f133a8f76e3c90bb
SHA256b85670786b3ab764e8609c95fd5ac311e1aa428fb07b475ce73d6be90b0a7926
SHA51257b4d77f3edd908875682d6bb179afe1f750b5e490a69b5d1abbe85b2c96e690c91ec62432e7a95c1cc88f785c61b73a68eea2057ad8dd99d20fd38f91234824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58571ab79c0812da49c4f6032fbc35592
SHA1f25225078d20991cc2a84e34fec06c30bced42f7
SHA2562bd5fcbe6f8187e36a8c38b02fb94988763bd51aac2cc8ee95232439e2d611ed
SHA51230191764a5d88a21c9ecd769b742a97368d609c5921a5f422e86bcf4d443c4681ef7951bf507e9d1f5c624fc17d5ebf349c067c0efa65775d024909855052c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f821cb43547c81191a0f996c97d787b
SHA1eeab8fb8580a1feda5d869294a2098676e577e2c
SHA2565980872ccab2546d7795290ad09b020bbe92edb8e11d9caf2a99e7ec80139c98
SHA51234824921ded1379f59c22ab41586abda94af759044b9f0107c9c03499ab6ed10986726345939189259a15d677f54e3b89a6fa31954f84f0a97259aa578c32b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d236906105758568d572c8161e93bd9
SHA1165bd374b7f2d448673af4aa70165a7a00adee12
SHA256a98771100246a4b409c8b83adc2367faef1f935400dc60a624ba86d05ad478cc
SHA5127aa571405dde449cba45011c4b3e57976251664f995625c56c344b0acd71ffd444eb5c73b2854f1672b818622dfb17c5f7ddc62fd6a510e8e0fac0fefbb6b687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee10adfb6b85e8735a8b2803575e439a
SHA1515ecb5805bee2da5bae7e4c57b1e4b68b3f93c9
SHA25643793aa36f51b973aa4d676cf76e719ec404f59b3f5aba21435b7e11d93920cb
SHA512b62c2fd3c75b3c2b132941a610f7273f0cec25b9c10ca696636dc484f29416edf9a43a3017242f4714a9b9816ce9a1064689ee0602ae7186c308cee26776f15d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f928069541f50fecae141d17a5590e38
SHA124a3226cae416657e7a3c89ffddb301bf1bd0b1a
SHA256ae9a9787333852f2a6700d4357e3882a920094c441fc09bc2ed7cd436b036ec1
SHA512f25cb748ee75de77bbee329a0e03f4ba18cb89e20de6b225e317ef57eb4fd5ed06911806d591e90f2b3757448abec6ffecf5a7a0956c6d8638be3bbe06c3e3da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0ede0102501d12e63fdbee8b4f1c78f
SHA120b9b00e1b2911c6f378487765281e8489ff4b3f
SHA2562e7eb3e8d7b61da1036e832bd8cfdeb03b31721d08e268a233436b8e3892c689
SHA51284ab7344485352fa32cb747dd56176339feb51d11b4f41e53eb3afdca481333e792d46b27c2fd3b2db69d4d785ca48d9f52c1d830343c76b34660e2967657408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f96a33daba16def91397ed92ab7da7
SHA11cdec5459ce920c1656524b9bb32c7882bda953e
SHA256cb907023102fa52d7299678f0f3edd9eccca82d7c46e206d1018f0a5bf759560
SHA512ee78e05e64b54d54f13e4bcc10810067c1f1f60301659781ebc81fd7dd14c72bbdacc9ebc4404d47c07b653a33d505b304ab77654fd82766bb4fe44515b43536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c49e26b878e5736f181711aee5be4fbe
SHA18b5be6e213e09cc8694bdf8560b708021a464d90
SHA2565f3bc9ebca9e6a5de8dd8431e745bf58c179212b2b38098387364aba3f2d4209
SHA512bd4c97c3ab76925321e09694909f00d7478dff97249dbac133374df42f657cd1ba73f2c207c116cd5198926de9d209cba46a8b363c86749360ea8e4c8e77a6fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ed08b3d53cc67939da424cf6801318d
SHA17d6c779881c250601d643c66fc24bc037a99f29c
SHA256f7f273f3750b8ce1a2804b6aa2b8fe09a133c85239c50637466a23da0420bfcc
SHA51214e617ca72fa9e3cb547474c03892f5b387afe50570cd09b1fd4088e16f1078ed6124277b329fa4e3b1cd84f4929df2ca6d6aa3b38b7104e3b6af87005fd26b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5469b981d55e57e752b3a749fc9ca2db8
SHA1f8e3776bf174c2ac117a7790f37ce92742475f53
SHA25674a210c8754b3a17ff451e65bfafd1b8b26bf5dcdd9c26c5d1e298470c4445cd
SHA5129054f3749520350667c8a6dac73539469860c46eb8df078df10af48253cad0e0ab149285bd00d2f8471095c2f2b51a0bdb467322d17185bce2b64d03c004a3ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587dea4d2303fed57e2785e863da32474
SHA1b5b677305fffab6ad8db1bb8a8c66b21522e10e1
SHA2567a9678fb914f20752e736e2cbf2596caf4f245196e07368e4e127fc4bd1293d8
SHA51244e80eec1dd0eff407fe0ba0677be4edb2aa334750980dce9510c575d1d985d61beed821035a5cda4d78ae89df10bf853f8f392d30fdfc6d6ddff5d84ee264fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fca1140d7583b6cdae58e20ff056951
SHA184a1700669a6664d874999f5e68857012ef7072e
SHA256671ad9bdde372f86fc9d83416075cab0e3946f98690b66dae5d160f172462f4d
SHA5128ad5f1f0c1a09b302f8205ddda18285b6d283b643146e620c205101dce1e5085e6a8ebfa783c9418d996982ce95dd75d4046acad3f45b415cf975ae55f330bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e011c99dc0bf23590a5d96da28cb1c0
SHA11d97f970930406445a4e91e2bf5cf1ab0d5ffa7c
SHA256d37d869699c18f6d15917d9c26ea4acc641616ab83f0c11d8555c68715beb892
SHA5121f33548aa286469e44813098c0f8cddf4b9322bc22bf6767f133e6b9372137dc548e5321af94617f91283da85c3e624ad1abcac14ef90160fe8d0d521256238c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53532c2c7160d72fe441400bc19fb4601
SHA1da13cd6f89abc57f9b511c0f3c5484479657ae5b
SHA256d5cd0c5d46319ce98781aa323847261d12d2999207360d3683dacc5466d81d69
SHA512adef8dab6c62a99bceb1a113c544eb08fb83cde752cfaf09e0a9fd250aebd76b9caf55c87085764dd07d7843896cdc4cfecf58073133da32f5951aa86598bdcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1f9faee6efb57eaa01864bb91567bb0
SHA150d7c285d58898b6dadcbfd9e723ffbef333cc55
SHA25627084bf7d038cc470b019bf1c5ab99ac9b55117fdde469a7f44a178bbc543977
SHA512a0600ea57f96204c0b1a6e671290aed58e2081664011bf986b2913d9a8147f952c06dca8a7bafa8bb8d295e9cdf26c823e4ae9b53e55b4c1b457dbadc524b0ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5547ec4b74a52b949ad4fee3a6876cf67
SHA1eb458f4271863fad6788b04b968b237a30bf9ad0
SHA256a59a33797b8bd7f34f3d8dfb4957c986b16a4d22a8beee1f32f139c080cf311e
SHA51248cef1be0a140f14fdd14bbbf94a824900b635b02b35f936834f571cf4d19034ba496dc807b131b07cc1791b876f630a39333314427a8c6c01f0ead822d4fb74
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b