Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
d32cc1349b4a464d378c0e229863a608_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d32cc1349b4a464d378c0e229863a608_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d32cc1349b4a464d378c0e229863a608_JaffaCakes118.html
-
Size
460KB
-
MD5
d32cc1349b4a464d378c0e229863a608
-
SHA1
a8913594a8d55a3818d2ec476b04fc48a5c86f42
-
SHA256
a02ee1ccae2ee6d20c4494f9fb9f3418d71175b98a1c2441d27be046ed8a3c12
-
SHA512
80477b08eea1264630cbaa0a7c854b3519d1b7e635b758bca55590383ff5271e19f8bdbcefdb55d9326d1c78a7ca31748cfb7a09947010a66e7d12d171fc9184
-
SSDEEP
6144:SbsMYod+X3oI+YGsMYod+X3oI+YCsMYod+X3oI+YLsMYod+X3oI+YQ:Q5d+X3m5d+X3u5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c00b7a118901db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{374EDBF1-6D7C-11EF-B12A-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000097ed948a9fa10e1084a8152cc5c863b97a183ba40f739ded084a3550dd1a54b6000000000e800000000200002000000006ff2395a4e73987836a03352daefc8994275b28d50ff1216534d9f100b43afb20000000a37c88f461469115138bace734d8510d33f3c5a674224fa5f076e0b10e46cfa840000000e2ae1b10a7bed8c983d6e1ac15242c866c6ec1877822ea162b090a493430939e7e6432ed78e690557927c3459679430aff528dba6f1ec0a5b8f2d6cffc783384 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000009099bc1b50d96f45450ff3dc5dbff8d4860d61616981ab346e4249add69fabe5000000000e8000000002000020000000cf16c7b024aeca1348ba8b4795273a363ef4538a6675f8e78c5421d0367a83f590000000689a6a9f46fb8db16b4dca596d054ded5c824063f30657ba9e9d4f4c7bd1b526cbe54e9724a5b757b7e628c173f770d37a821db067fa844762afbb9d9e8adb4c611e5b9c2552f7cd147d182ae75957c213c6d398068e9d12f56f43c802d658ba775bf2578b3cd99d757afb236f941521a6caed5391237b159efaf963b520d01bbae3ecfc7b520efdb10ad4bea65a8c4d4000000042b8e251e573bccd5a721215f3f071c9ff4a065f377380ce8ab1a92dfaef237c1b9b82202ea609651acbba8c7bf48a9a9236c370446dc62f21653dd56e85b06d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431918441" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 1452 IEXPLORE.EXE 1452 IEXPLORE.EXE 1452 IEXPLORE.EXE 1452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 1452 2424 iexplore.exe 30 PID 2424 wrote to memory of 1452 2424 iexplore.exe 30 PID 2424 wrote to memory of 1452 2424 iexplore.exe 30 PID 2424 wrote to memory of 1452 2424 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d32cc1349b4a464d378c0e229863a608_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50769139e3b952a73c98c12548d815010
SHA1fe4ab828ac9292fba1232d72fb679dca9ec82b4f
SHA2565854ca7f277cce335d37d81e7e67458bb582614081071f90b14c472638f6245b
SHA512e627d140ba629e9d2dff3d51424536dfbea9e5b5d71a986bb2e3450a8763a7f05c77a3cc07aaed48d30dda28474dec02232b89506294b916ec545154a8e3df7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53269aadbb8b378c4c1da6cdf053c4361
SHA1c1b47232444dd6e224c3e24677bdcebd23e26a7a
SHA256ff735dfee9bb4dc6ea6f4916d557019ad2c068ba772b4af2735db0cc4b809f89
SHA5120e038a2c524f9321f7fe8e7ad7a74687a690fa3a398fde97c56550bcf050f4622b3fd85d003b4c621ac78e3d96493b56d8b7bd4573c51160acfa3d5decd8eb93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0b5dead470de09c8dff02792fec0931
SHA1d11c7d8c71c2780659e56df92a24f2e5e8316379
SHA256c92e8eee65192234ff31ef8941f7933e854d0643a2558801a3df5598d37d267c
SHA5123009ce0264bd7a50ec08dd37345dcb86a4f6a6c62744815e5dac269c5f23bebfacab6d78696000340c740b54ce0ce1b610295ab77852472dcaeaea1b3f5ef10a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541804c4ad36795a9fee051f1d2b7ee14
SHA1536670d7b2ad8ccc775c5671b253f5b35861dccd
SHA25641497ca4aaf6375fba2a1e2b5d43d0671451f3ad367fa61e1155fd3c9e7324ca
SHA51222174717deb79103fd41c9dfebf5219ab05988583b88f97a8c98ad1cb81523b26a6357108ba0e5344ad60127b5b3e3036eaa144217d7a372b17a421466de61b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a01a00d56b96641cb59f50f24ffcb15
SHA184a657edd9c83ac6bda20fb46b0358d73dc0c657
SHA25654943b0454dec1ec660cc3d87af31abc51220a33e8766bcea652a3611a132895
SHA5120543fe2a6d332f2a4d029894839195f6b8a64ec79c948454ebf3d22d64c097a2cb98aa17e52faf3bbcbbe4e31a71c46db6827e712c65c25dd01d71d8ea345af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fb2813c5a075b56a703d293f2f026f5
SHA1711dfd3f451ef2ca6ebe4daf8da997b1aade3630
SHA256d9bee118013b21c504ea7b71db8ee96c0d7876d4857159d6b07d8c5af4810a7b
SHA512d776c6ca6f6792d0ca5fd707c90fd4bf84964051f14627519d29705525cd9f2fe2d6c58f6313fe27daa69dd6a880fa4bcd49a37787c8cb23b441f94770fab7c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572f486bced9b88f606d7d09500271752
SHA14a300794e3368f20b3b4f889c82b92aa2edf698a
SHA256dfbc985ffe4a8aa7723441259c5a1f85598ca43fe2c6f0be82e26489bef4fd0f
SHA512646632247c4085f8b0405c868550c14b2fd502bf8469c22ef01272f40f2e400c37ce2bf93b6fd08df1a1d8ddd3f8420dbff8f6a13941b1e1279c0b40aef5df52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567c7372263e2d5196d69e8fc06a16235
SHA1d92fce007387754fc7d0dc4b01cd728e8b24854a
SHA256b0d98e13d4603537d47fef3a5f6cfd676ca5c60aa3f219cd4d2c4899959b7598
SHA5129a7b9ef2b7fa46c6aa4ae07f24aae0b2771d3beec8991134ee3c6fc9c61bd67fc122a625065446f07f25203d97bfc95aa05150a75aec1a2e3935c93cd20ecf35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b008f85572c711f589f501c5b63f3939
SHA13686bc9946dceb53a3f48466c4578648b7c94d8b
SHA256573d7baff74696536ebc3b6feb069ffb5b7c24541de24c60b4bbbf879adffe30
SHA512bf7fc0b996d3394a25d039525f025fcf52264c6760f7795fc70405b3051305bf3df928a8a12df8a282f16d8559875d2c83463ccc619a392786b3a5c1ca17a978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584308222b260989eeaac361a0818f700
SHA1b726c8f5e8a75f75b90df68e16e5176ff82ce2d7
SHA256a3a632a0243f5c1df5a7dac8170526013d29d7949ad610a7f82f0168ca6e19a0
SHA512e40d4b11946cb5ea3bb5fe86f525b00da9e6499c1a3c37903c586b34dc6c075e3906ad695bb1851dc5ed8a5ed3ca3ccd8f93b14d34108ff5fe4595751bc33fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a98fd6eea3204d30ad78a299b95f61f
SHA1c6183585311b068bb304516985b2c0f208742fb7
SHA2562664c05ad70297fc7953e3c6a6d2a3739d68c2b3a6d27fe4bc72c16357675de9
SHA51265614f99da2dac7cbee31aa69f32afd04f6035b9247d1fe962e761e4df76a815860354dca0f84dc483415d893f0bb07c471d8aab407e3f56430577a823a01925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7c3a03c3e6b821989a48d57fd823f6d
SHA1a64af8e637727c60dff15c58d35675f0024212aa
SHA25607e5af0d18a2a8b3bbaf78d96bd8eb69aedb6ad26fe95ec244ba91119ed413f3
SHA51235c212d745781b51e4900a7c52e9963eb7e7a59109fd7c496c487043748a4f82aa2a3bb8fb7a33c4f2abdf12f268c4607312d0d592a8e500883506893cd7ec3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e62c8aa4e6f4693b2f40e087182531e0
SHA1753502e4c1bf6414443d3ad1dd4f18b16245db5f
SHA256f4bd872ec2ec073185df9fede8d22aaa1ef7a4e15be72b5bc08540f738cb5021
SHA512203af2ecc7918f50815fb1fd77784390520823516e5205522c5f2db0b425a1657c327da601c488f9af6c3c362c77e8c95ec5fd3db8223cb29d524fe1c3a58761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb7e81c2bf58c3e49d1ae235aad919bd
SHA1337765943cbc8b0520ea37792b589c8926c24cb1
SHA256a07cfe3496221878299f512b7d6f8d995e285b8182ffdce6545322d85e3ec826
SHA512596d9e7a55c45bc658b26206cfeabf866f9605b6d900ce87559de2721a5eec64334c31f7e632f3d5a839a74d24f26fa1af707e21cc6e7d1224f4e6b07e0e4064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d66809301a976e0883b36fcc5d7be34
SHA1af973bc8d7139dc4f94aa2ae5bbb7e358d5545df
SHA2562d3abfcddfbe2d41b4f86789ccbe6f511718db3cb6b437fddd49a906063ecc9c
SHA5128da03997b1b91e9d06be5f86460fe70b5d0ba1460417ce3e12e7e423edb5d7046e92c1247815ea61faf8c777fa0be469e8a43d6e78f365a70e4e33f88f2a4996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b208f4da18f3c78c6c6428dc02d0bef
SHA14ff99810d6dc4b8e560009236a75697d6ccfe077
SHA2567bcfdbdc92f8f673e9a02f8a252eb7189a53b4fc4294b4fb651aca732f456566
SHA512c6822b31b21705217d4236538aea5db0fe5810f2ac5413246e4ce16fe8a9e3c37e78e6ec54ea82200f68b87ae1bce85a32575443d03251374a214f7f7b73bb9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c37326734049235f3028086520b6ace
SHA11fd44f93e6d82639a90f3542cb7d0e6543e94bba
SHA256558bc6bde1dd80b278416184e46790db4093cd8a785196dc5a2a9d23a3ce0c34
SHA512e5546b56681adc05887bb45069956bca45defdcffd0e3f38a37b86048f0b36dd1c784c741654e00513a8059634e9f9b5721dfcd7e4642e8696020cb0789b20e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5981bb46c344b301d127c321b3b8cb717
SHA167595cfa443e5fd63b40e1218bc24e517d6d08ac
SHA256234a36a40abf85deebba9b971752554d938bf219d3e7e575632e036741acb130
SHA5121b69a18a7ba5a6b13e40874de4b2da1374f8e0e72b2a46ff029646a64f50f77c0832d09f14f24788d7f4a2a7e7f9ffcc8974e1b08bdcdfc23474377b4438f22e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5752f1c10ee6966965cd94ae831103e0a
SHA10a08869a46fdf86e8c4bea44cb63f6f0a2985667
SHA256ad34c1d97ce8fe013823d7e9b0fe9d3b7ab992d541699c9e77746011c0bebc2b
SHA51248c1137b47ba0c917e2c54ccc79ba50bd8fff8bde05bd0be230bcbd2e8d6c4ae6c66655ce8921190a64d67ad9db497a946fb723cd6de41ef504dad31df816068
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b