Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
ff1718c6aaa2086e0ab1107df4a6a1b1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff1718c6aaa2086e0ab1107df4a6a1b1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff1718c6aaa2086e0ab1107df4a6a1b1_JaffaCakes118.html
-
Size
14KB
-
MD5
ff1718c6aaa2086e0ab1107df4a6a1b1
-
SHA1
9385d17ff1effc046ba5aed1e4e1b5967e1ca2a4
-
SHA256
63312bb7c43e8f789f824e5e54371c0f12215234481a7631ebd7702498e3de06
-
SHA512
edd0ea48cdad4563d3c9a09a61c3e31afb05ce5ab4962423f8dc77ff854c2c38dedc10aaa85d5de8703a39c8473cc30cb3b0dd52708de9ffb2ce5291a3bb6be3
-
SSDEEP
192:bWxwMLajtSsQ8V835xVvxxS+UqSEiSkUUcpUMUxUSSGJxS9SlHxSMSMZMxSyUt0y:bWx/6V83PZ8V1+9xwz7Zl3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433795319" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000be60b2c09fbbdd1a9ba2b2fc67288a20ecbb162efc0f556542ede90b1cdf07ac000000000e8000000002000020000000bec10945d54bf4030d1e705bca6132b852ed4725380b583954454e815e65145620000000754e5a519483746d9b062ecae627f0c5c6ca20d54f2a8de812561cc90cdbed6540000000c4f6ceac929d32b03e6b7fe49a0c4b334c433a869ec544a642a77a5873f1f90d9975273009298f9f0fd951de34effb032ade1aed3b4f9ca7654c9dd2da4c7c8d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000ce5b60fc31920fa32ae1ae4493045e7a2a838570782344f66878a8a242c3bb3c000000000e8000000002000020000000af5f240c34d48c2111efdd8210437874048cceebbd9d546cbf185063e6711fbc900000001af86a4888c2039e7076c81fd9cc842be9c98d19d4b406a2ac8cc173757c898d0fe58ea6b0e72d3bbb741eafc772df4902aa31eb9071406b492c531a85088971f0ed5002108385c463782d8ea4dc9774da3b0ad427e38fc9ee50d1a65936c7f4262e5a7533dc8743f02f55efe0c770da38449a1b58123a55372dbb81bee2785a8b958fbbc9a297b1c885fe2fc77be9dc40000000360cc00498b7cd45af07dba278eef2033c9810dba216bf07511f8853098a0636a95a873678fc5cdc9569b800b2883e51883eeaf8fb0c4c6fc0332e16d42baa99 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{292AE6E1-7E8E-11EF-9D9F-E67A421F41DB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 003f5a189b12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2492 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2492 iexplore.exe 2492 iexplore.exe 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2072 2492 iexplore.exe 30 PID 2492 wrote to memory of 2072 2492 iexplore.exe 30 PID 2492 wrote to memory of 2072 2492 iexplore.exe 30 PID 2492 wrote to memory of 2072 2492 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff1718c6aaa2086e0ab1107df4a6a1b1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559bd243e47342e23651975bb392cb03e
SHA12b7ed0b3a2406ce4f69192cfa1994a6b0a43e195
SHA256f59edfdd8a98f4dd5f975d5a019369cbfbc77bfb327dadbe7541260aef159661
SHA51265ffabc777426da05d8bf972ea55d2e1a7da2c6ccf0168b96b9a9c8a970ad7fd6ec9b3416c8fa129dc4fb099603eee974c009c73a8ef946be422d095bbbc0f09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524df62f0a49f582bcbb332eb5f30b7d7
SHA1e39c289718f9af1e7bc4998aa8cf4df96360da52
SHA2563c9a9c66ca9b41e938a30c9683c8828c1f5a8bf536da50ae76ec855b05eee95a
SHA5127a5519f26f229d1fa7c85c1709c242425219f326af0ae8d1a9aa79799465d352f5fa3bcc8e3d26fbbf2f11a66d7cb2b511915035f0347d577d81734d26528142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3c0ff984da968e49d012ba2127e15df
SHA17c5691a93ce698930a6359865d55c61d3f6eef09
SHA256f8ea259291476259cc9e83c7d346bd66fcc0030f601bb3c598310e9e144e11ac
SHA51253d6ad957be74ebd3698863c005fa9430f220010eb5241af9fcbd63b87f919c915d09e4fa2949eeb59157f04448b987d9ade7c43edd59b9900a0bd90e9bb3eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51117044f0e9dea34eb8e5ef28703bb16
SHA1c85ea10e50363aa604a55a2724f8d29c5855f18c
SHA256ff480185cdc676e0c21d9f5ceab47e2a07a002c5583320a0a8a00e85b238f395
SHA512b2f070ded47d3b310581f9fb29f245d3cdc4c5f0f6bc19a4d012ed60a39ed16739ae656c6e77b9e4df791a1358104381eb51656f604fdfb7cab74462dd391138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e00440c25d1a00ac51ce45241d7098a
SHA1286f3cf0da051a3559709b115f2f04c202287c9f
SHA2569fd13488b786870bdff93972655145d608898bdca6685ae891e732498253f1aa
SHA51281a0ab286a2635514758beb344322aa59c1c5e17bacf27350bc4d273b3686927f85c8b2a8f0ca7ecd761406445ea13f71a99b4ae89a0cd6b1e7c77d3ddf6dbc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5436e71986ba90b594edf4d68a2e0b5f9
SHA13a77c08c11a35c032790aa2a62040aacc2fbdee9
SHA2561b520ee0c274ef995a2fd51d5080ef266fe2a69418129392d689bcec25ed570f
SHA5121d31787411cdd350ee672d3d1fa854ca8c14ae782bbd5a349ecfae5976e81cfd217d5e16ae7c2c0cc7371a43345dabe592854d42f147a56cd3487ac1ed6e9475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9f1159e0971e40684ad2c7eb422a3c6
SHA1525f9bc2afba257482f05386b97f816a7a7b9c9c
SHA256586aea8247a90db0ea3f07972cce8ec365a7cb8b9f09d96e3ab25bdaf8bae21b
SHA512a344eed3533306e0b461eea71cde2a75148ee167a282aab55608901c8b74055ff9c484a664a0a077c568033972aeca637f66f8557660a116936a1dd1e486ff8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8633ad83097fe65d878c0b5f28b77bf
SHA1ebfeea5135db01cfb5c518444c8f55a8637564ac
SHA256992e7231bcc92b63b0dd9ab992f95e9afa162447a7350e4a4ba2371b6b0d38b8
SHA5127c19224df0dd7493c0ec2f606a28138bc05d71395a408d62c1f1b4f15375fa1006b87659bb8dc9cceb784d0a544c86a8c5adaf36a81f8fd9413f71f8c7d9bcfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f01cf8766a3f0ab66e1599368f86e4ec
SHA14f10b3bf495c374aa24655b15b8ed8ab6832fd68
SHA256f198d3d78b2baac08dd1a442d03bb8d1c74723b52d3b81c1966e0d59a1d1a6af
SHA512193b733595a46530f5145462960e5aaca832fd6eafe71706284eef66df53af99fe1bc8b0169cd0f3e4b713f9ee27b6f61260a80df8268575794aaf85380934af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd63950b84126d135893f2df933bc7dc
SHA1d0aceb4530c38d401f9676d2b8d659c781235f3d
SHA256fbf247f50f007e8dadfb16b81e18d410a11e7f53c63d0af7ee0084e2aa9c31b7
SHA512f91085e73544a95cd4257053b25f18aa5a08d128dbdc60644268e4a7d9b46599a32bf1aa9408f3e7a1fcc68eedd34f5b4648df52f60e4077c44f9e31e2813a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9f00139b9812aafbae44dce69be801c
SHA1f4476ab83011bbbc9e5c6eef27e4e6e2145e359f
SHA2566eea1b8ad011b69ddf6b88fcee78bd17c493a67c738eb99b5f1421d82c33b087
SHA512f03f07381444b8ecd2c856711e7b5ab9d7e722ea1de6f0e50f99ebc2b7c18a00cafc8005319cdabb712cd1db0e58075fd90510a0cfe91f79ddf1372182001614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea7773f24a173f45860f5aed30aaf9a
SHA1b52e4a132b286c1ddae87e2c34764b3176c823d8
SHA2561ea3d687b9cb30fbd62b479119b746c6ad77d6e51fa2d911dc96aa3ecada5b23
SHA5120a67eedbd27e6a34df569b65f48219950dd34bc080973f47b15d5ef6a7e6973f572491e56df76d86f3fdf6915c1a0b75a3dcb8a827e785990e1b879709498918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffe8977178b8a2674eff87d97f60d60f
SHA10bc0c955320517704b99097428e5f6b622aae48c
SHA25629dac771433018da47264fadfec3661b5de313a2455f9ecdc19bdabd49b1d447
SHA512afee7367e8d73bfdce2e88749fe662a0ce60771be87cdd71f116109edf2828d7e6bbb293d3a81954f15f05737b1be072ddd253255a56ad4ac54e4d1706288d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54905d852fd77632ae74e76668e1dcd4a
SHA1ec4d97926ab17f931a737a7d8fa71a909d66f276
SHA25693ed4c87da78c2e5447a9800160e6be0c8cf9ce090007e81a04fb50ee1b75988
SHA5121f341c23bb2b2f8ffc95aacdbc5f6c5ff763ec2ca43c55735a78ef9fbfadcfb2eb0a3a9fe538471adaeca36306fc5eb51041f6a05c7b398175cbb1f1424e3c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e1497a6538e5a7520138714eedd349c
SHA130f7f00ae16395ad6fa131287cb191e91405429d
SHA256dba2270381a13569a3d0a3a33e4729134751dec48ea05ddbaa83c5509db2f1fd
SHA5126dcc5b7c057d62052ca8d3a0e5c6ea605fd74264a12850e9f97cb0829599421feacd275fe60f28b580962f0787df2b95f6bdfa4730702e664a7e3405c0724a84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569c4a83a9c968ea8be67882cb213bd50
SHA1a69591bf90e50347ef80294ec6d9312d9cc52d4e
SHA25629a79e746f2c304f7a77f98d8d06cae957d309c22f0727944648e76132d62238
SHA512e3e848814f4990b800573286c7ff9d07360fd0a48ed3ff14ec35f09cf79e15709b299f41a3a36acfd15e44954b60aa76678d628860010e88737473f5ab572f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543e431bebf45619959acc643ea12cc74
SHA124e0f6483003bb46d1d672fa4f92cdb543aac0b3
SHA256a0ea7382ec48583e8153be601b2350671306500b06218e624b607c1102ae5035
SHA5126cc21bab49678add81604281d9d639f5c1e6ba9d5d87d927f438e193fd84895a2e802435412d8e6615fd95f951756179d0f8c259d9591d2e07391f196e916917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc0c5702f41cf6d0f60f53101fce16aa
SHA15a0d415f2d2e099b37c710cb487a260285ef1d24
SHA25601e1175471997461f53540ba194fe44b80a18afa780410d4fb4f96b3d519f105
SHA512003ede8b2b90efe69446e714639dc461d5f0767b746d4c2f99c24493f92b9c7c71740782531700f874b27d543cb15146ea80501565c22e89bcdc85da4698056b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d307225d081889d6f7ce4e6c1b98435b
SHA143dae53370715b2d7889d6375b48c000bb4b9fa7
SHA256837f8abec79df9e46984b3bc50930025d98e567efed6633bee9e9c14c2da443e
SHA51238b03b10c8b0caf7cee29ffa36e54a424fda7d6db2dd908bef7b4547ba7f4e433b76b0cfa17b482319ef3e324d0e78b48dfb2d6428a1ec2d94b282893bfdb7a2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b