Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 00:53
Static task
static1
Behavioral task
behavioral1
Sample
df32de3e414d644ea29a3581e0371263_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
df32de3e414d644ea29a3581e0371263_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df32de3e414d644ea29a3581e0371263_JaffaCakes118.html
-
Size
68KB
-
MD5
df32de3e414d644ea29a3581e0371263
-
SHA1
834da4b235ac2b7e7a54e2c70bfb5689f6de0694
-
SHA256
07a64bbe71f674fc9799223613ab3a84480aa2365fc4668a68cbc1178328f74b
-
SHA512
3e0cc7412a24fdfe909063a334c1073bd94627ee10f003297b2ad33338301b53d61f37d15d6d997cc8ebc4eeff8c7e477d6af392d358b99733b4b88054a12179
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g6gB94+BcZBCoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:J/0+wVTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000216f6b07610b5f7a38ea3e44ef047ff4fc2ea20a618149d01b311034c8921ebf000000000e8000000002000020000000f8ba5e9408f49f8645f666f638b9c1bde0dbb8d5b32188afbd215543ab8c069f900000002ee1e2aa8716755a05d4921c8ca6077edada572ce4541c4d8299c9b4a059c9e8de49cea9e432e774f34ca2936c27fe023c490e447a81340b7e28f8ab8ac53e975fa8d07fcd2ce84176c194ba056e9bfed94ea42359c4c2b43c21d24e8f74d9c9bbb2e87226c8c30aa4954e5857e71b16cca97d9550dfc17857329326e29acff06bb1eebc836f9a382c5e695fdd973b19400000006b9ae47f7875ed07e3e70dbb1aecebd3f3bd688b313f945f8739a3f98605f1897164657c292c46c9947e6109db26b0f248419c98ab6e4c5b5ec51c511ded5b33 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0ABBDD1-7233-11EF-B5D6-4625F4E6DDF6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432437074" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90846a994006db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000434297dff38a6ca3e6d7b40d939b8bbaa40579cce59e0ceebea8a1a934550fd3000000000e80000000020000200000006f688957c7f0c5125f702d08617359efa9737cb34a09e084aba1e31b565f64452000000042e6781e167752d3e28209770ed1ca87a668982be2fcd320571afe52c326f079400000005798f0b1ad560e431dd32343b956c8e6c6c1e630996d13ff966ec4c1754ba6ce38160524031770619ea265c26652635c2c0676df6aff49f148dc5dd448298470 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2392 2292 iexplore.exe 28 PID 2292 wrote to memory of 2392 2292 iexplore.exe 28 PID 2292 wrote to memory of 2392 2292 iexplore.exe 28 PID 2292 wrote to memory of 2392 2292 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df32de3e414d644ea29a3581e0371263_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e098a7cdd5bd399747af003d4edae187
SHA16a7900c4f8cb908dd5310babd75c5714e4be55af
SHA2566cdfd680757fc3d10f09874e813c75131972803b910e54406ab4e30db78228ee
SHA512e60919dd7b97b96341ec292fe6694f8f66a0a910a3e276d95bd197e1ad84062151b1130458a19a2e87682c0e5ef4d23d41e9c1d0c7185c124260c199ebc3eced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a5ca0a60ddee4c3c90a240e8f0086f4
SHA1b9d073ac8c2eb7151c480273d8d9ab8e3e0f0c2b
SHA256e7da7b7cf7ebb3c2addff71e393f265eb59eac66ec784651333b8ecdd3f5bdc2
SHA512fdb307b17e3fb8e3f19527d35fc2af538c137d1d348756c559bb6ff8bed5552405cc93eff01a646741562fc7403f34f86a780f83a6bef6edc88897d28fdcb6a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c0f5e60295a33acf4ecd7be3378a5bd
SHA13832a7c2550466c16f2804dfcf8b0850a1228f3a
SHA256cf0e2efc011f3a81f5ee261132fb57c9246e79549a44d02a61ed99e4c60eeb6d
SHA512a603de119f42bcde8af7abb93ca0b8b7c162c31ce83ad3189dbb5a426ed5904e96b76a0c425dbfc3d69bbc9470dddc4a2599248c68d3b0a009772ee1a17002b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5539407eed867a3c8736a4301c168396f
SHA1c859789806f0b5ebb22724b50391f600d3b8a256
SHA256f4a01ef90e0664c284b89be0a24a7bd3fc68fa47e879893071921cd67f49c79b
SHA5122919d3b5ebe51cf58de0e17d4cabb4410e5c6244b7af02f521647438d3800e50098d6e10f8cd1f480a6efede3c0a00aeb0c9fefd87673163ac6c1449c7268e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4c0022414846fc846d78bedd8621f91
SHA1875a1634b3654034d172afa0ec2e88feba444c5b
SHA256e188d758be0f24bd4cb8387159f6aa365df035e6cf65d0009294421ca10754b6
SHA5129cd38d3ff90f12f4b11ada32d7ae283f20962c2b76c52c010a7d5b85a9525683fe4ffc2e047b597fdc70c7b407146dffba1438ec5691c16763d54abe2b4e2543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aafbc8f2e2330d90a6fd0b654c52ec8
SHA1554d7374755bb99527fa36cb615285463d2321e1
SHA2566e53799256ecdf5d253829dce9ef55e6860654228c60d61605405d972ba689e3
SHA51206987f5926635691f4011b1427e841b8584d53ef05bbe07fae17b75c5edee73f68a3ebefb3f9ba2a7169b113cbdc3cc7606e10987190777a9a0bee042cbc0cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5bc6521b5352926e36b96847799e05f
SHA1fd007baff9cae10e28d7786fed511d917865a5d6
SHA2568bc05ef88e81cf534b9009e89692d522ecce65bafedaeb292ac2659d98957f71
SHA512816fdac19d6bf4e1570c36c254f38a4e0a605859f73eb6acfe18a4c472dc887574b012bd8119e5be279d793df49a94596813c2f30cb75c56df5f56670b89b582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530ebe01759ce62120d7ebccb8baa9916
SHA1fd072e2630c481c076fabb2e934cb7dc12c54180
SHA2565e86a85efa136c18ed85fcc16cad6608eaf9c3f05d912d22479fd85a04981c82
SHA512a65d8a2d0ee9ada21a3d99bb96dcfa4cf46f1e9b0ca1089ce3bb57b77c9f0f834003033fa21872b746e186476395384cc6f10be79466ed65ead72b8ad51d1897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6893d700b855f38e526655234c57160
SHA1ee43b8ff00755692b89e8ef47de1d2224573c2da
SHA256889c193b95a7f59d9e36ba1fbe2e1c792d864b39282a8dbbaa1a6f79949ae496
SHA51225bc373b6dcfb2ba6611a477f6b6b08da7e9b1c2a9c66fd49e9b7fac7985aa97491e940240cb89eebacdab83fa8549bb4bef579976761dbddd55cd139acd5524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9d90dafb360f39bae40ee4e56b65261
SHA1816bcc0d993edaaf2d381fcde80d6c76c5b937e7
SHA2566c3b37a150277185158d9b60c18dbfe5329398bbded856383cc16a326717d063
SHA512465637db83fd31eaab604f2ed1b28137ca5f44c5d27160dca762fb268e28bc8b71c0e5401891d9f5ff02b12824e1215553be174da351a2d112a7544d1cd5e260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f15a9f47dff337577f24df61330d6ff
SHA179a87a6d6153ff930f54b17ef244a06f719da182
SHA256eecc69c8ccd2206ec0b27e068faf25aaffadf522ef63dc7c84734f5e7c1fb2f4
SHA5121aea496addc7232ff06bf21c38d67cbf457a67237415c8c7a5f1e1043b3a10210be946ff827aaff63991de920538c5f2a5bc7a9ca121f2c20318ac81af3ea7f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e3a612a96969eb548dc8f664e10290
SHA1876a1bf4c798c8f1931115474fc59a8a386fab39
SHA256cb5b7500b6352c06d4180ebfe3a5db5de9debfa937ab8863c23a4de955bdb81c
SHA512ea069b01a98b1a928d80d5bd1197b7aae408f3086fe493c8210a4c65819ddf52201eb3fd1a885b847094eb0e6df83e30f1625cfda4f78fcc87a12e737ca2b164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b12054068492c6a2d8996db889af1ba
SHA166c10e5d0f702a3757be3f324ac239b757dbf306
SHA2567fed8cd48a0f3dddd4b70f7b3137e380099e53d37976d1b5ed1083e8d1ab368d
SHA5123a9243a7204043e94cd2bb518c3a70ff74e862148aa44da0d27b3aaf0f0a3fae5fd795f9a3f2e541c1395b7e0d7f33096c22df42abdb3b63b81a0e646e067a6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9ca342392713082deb00ea54aa1cd32
SHA19f821cd83d883d346a6df4e4922362a619f4c413
SHA256a6968081d948fbaeb958b0f4fe13752fa330ac5ded53f7f757958ac86b11b975
SHA51229a842690db24f0576d2767ec0c2c7c42ce1392d40ff043fca060485c8b418c71a6bdf089149a36df9797bb41836fabf945b696e070cda20a9236084687ee74d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537714a4c65bd72e50009c7b7f2821ee9
SHA164ea649055e78f67497774dd5e5911413565ac6d
SHA256b5f4c29e748d51cd771124e870d7969539297ae03323a97a319b73120322afa6
SHA512289cbad503dd72ac1a8145847dbfdda7d7debfc0a6d0d2676977c5e820e84669a0acae4c9dd85e50e73327c441c71395e7000130724f77e1d3b43c718570de36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b657032e9784f900b93639fe7d391b0d
SHA15c9f8495c4371e0ebcfa37e25d14e54b57081145
SHA256d2c73c8835fab4725ee6e632462a70de2fedf8700b6f21d8a4000bd59295c5e6
SHA5129daddba82096dc838b4af69754776d3e023bb43493a122f67e0a96e0292095b61f1a30c2b01da0f928c2e4aa678e3ee27b1eec0252e88e3381c8ddac47c57643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1905028463d4c7d1195bd8c911fb9ee
SHA172e00382779f4176c9ab28af1018afcacfffc945
SHA25607dea761d1ea85afa1d3c04b9e822d506a1b47e4fdc893a98e6b6e331e13c662
SHA512ecb9416dc6a364ce63cccd45d526be9a23aac3a8f58eb0a96609aabc38ede156a490af7c607567987b6dc43593895a12a1465d40fb65acd56b99244f9908a844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a72bd8ae9efc7865223fb9e7d82d7e4d
SHA1ee13c279c233a22f2cbd0060b7717c3375ffd91c
SHA25641fa50a31bdbe1590a8eca36523320a2b7519cdff4ee4fc526ae490b6016883e
SHA512719f78ece7a22978881e5fe7d781d2c6d917c2ec7791d22e0d41ecd135d960869f03dfc824d63857ba953e88f0674f7a4a00f507ebe43291b92947058e02cd29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51255b1511514f5bd95721ad26f61468b
SHA1c107adf82e7399fe51736506d8c4b0c004111c60
SHA2561ad804c296fb3eeb24b86e3c133332cdff2042779b303a628cb0a2bd234cc182
SHA512ebe21c9c6759b25a87671eb33182d8b9b020ee8a9c7e18320783db0aa5d5bf5a49e878c0333b40092c6c9d1cbcbec8bb055409b58550595409ae3b1465ce3394
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b