Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 17:08
Static task
static1
Behavioral task
behavioral1
Sample
434459a2ee2379c3369985a5a3ee4f2c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
434459a2ee2379c3369985a5a3ee4f2c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
434459a2ee2379c3369985a5a3ee4f2c_JaffaCakes118.html
-
Size
21KB
-
MD5
434459a2ee2379c3369985a5a3ee4f2c
-
SHA1
c169930cad308de5bbc233b288034a9386c9aac1
-
SHA256
b640a65ec8d4a9c711447b897bd1b3b6ffa5ca349cc60115357b37e36e082b86
-
SHA512
5e5e03ba3bcc40d9155de70d2c69a348fb25506c08c50d4c992386c7743cb275a1e40cb03846124aa8690763d04797a5d4ff9e98fa9e4b538b7da5b9d066b164
-
SSDEEP
384:SdavY5ZBys7rFtl/pghEN701VG694T7pcVo1Apiw976D02XW1UTitFEWSWAmSyZW:SdavCDTXFtDghEN701MTNApiw976D02x
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435087554" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E13DAB21-8A4E-11EF-A97E-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000005eb582aea26ce846506752c2581399fda37d4f54e184b323c40c7b1f70350913000000000e800000000200002000000067c2e0b4fa3914709f4ddd7688822f09e306b197e0d33b9660b3faa0d26f809320000000b4936aa73f2e06549cacb827cdac9805cbaad02757d17e0ec2107e7aedab22a1400000005bfffdcaf224cc8153f07322af5881471b46f5bf6617576a9550df2cdaaa9412d72cb698cb221c08028a6f9bf0ba8bda82941f33fc3afbf69949a548970010f7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4086f6b95b1edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2388 2540 iexplore.exe 30 PID 2540 wrote to memory of 2388 2540 iexplore.exe 30 PID 2540 wrote to memory of 2388 2540 iexplore.exe 30 PID 2540 wrote to memory of 2388 2540 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\434459a2ee2379c3369985a5a3ee4f2c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba6c69f83f6a8b1758a1fc89e9a6915a
SHA14942119ee5f3796a3f198ac9182d2872cdbad6b3
SHA256eb00a1473b1fdaf9bb1c671fbab5cbc65b3a42739828c0ee4701b345cad5680d
SHA5128efc3f14f283e713b1f74493062270aede731b082bf6ea1c35562b64a9bd15d6eba57cb651840eef15239af82544d88d9f41c3b29804877429c3cf9d29f338ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea2641ce116bfd23098e4a15347b809e
SHA195c86bf2803d2795cd9f8264a8fc9ee0a7bab58e
SHA256417c52f224ae92f41f1ce330f227c74daa758b25e6ee2a409b248d9acd5e5bca
SHA51286ba4f7e08a72283af06c299e01eb220b99cf46d7312982c270914f587860eacc23b5183eafe3ba5c6d8027c935e4a1d9a85d634a0d476ad3d94b8d4968605b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c9578b24a2eb337f40f9f056ae7b30
SHA199a942a648391b1b272d08b5ab97f87bc68cd7fb
SHA2560992a188cb056484279b0426d7e83953b51ba38e2c77cae866fdbcb198e58cb1
SHA512f894c0ab0ef97b70e2ab8c32f8761926af8c0adfbcb926686dfce4e52a44698c763cfd17b4288a60fb25c5fe92476f1fcebfc94c6fbdb4e6d1f1eef63280041f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a9577ac6438fac09ba568ba96852de1
SHA145f6bb151eb917a02e859ddfde7b4e342d46535c
SHA25621e9b743004cf38f6213b2a179970f18e66033f0fe6755d1f8872e090079ccfe
SHA512f3e165df1059163edeeb5fba8be7427bf4dc104ce3cbef740eb981e4fafb33e2a3cde3d6bcb29320f129dbb7e851401bbec86de87414718e04aecb8c42736770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cd932a246e428f7cb84b7ee0994ed3a
SHA1100e62af45682983b6f6a7bf76cc617284ff324d
SHA256b2e05ac599e2391537ed0a9a23fd401864d74a30e99aa4d398b756cbc141998e
SHA5121abc7f56d33cc0ca7a306caeacb98a54c279af7c45e3b1bb7036a2caf604f08a0050d234f4bf065892b1aa3b82b6bf665023fbc257ce11969948b8e76e08d9f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0047a29b31991ac25663766b1b06bcd
SHA10c2715c3d0f3af3e02af9de0847b4b3f281391f5
SHA256dee86597009af81b5c7fba3620f5306f359c22c94e4cb3d6fe83bc0510fd27d5
SHA5129113c04860f3c77487ec4b3eb6967bf12857da0d722560898d198fa4fc5ba03efbee09b1f8ef81f3bf78342d6c7162e160f3f4ac35ea2266b178e6afc3ff72fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fe0ba0f4ad4c35077c5840f61c04dad
SHA1f7de8a9f193b5df09be111fc378e34f96b92a6fe
SHA2563f4a4c2f5565f03e4d8821da326b8bc8062b9604017e0a7b97c6dc851b7f0eac
SHA512cdc95d43dcda6cd123020f3ebe8db2b674895a09c21611e769b25336b24de627617825352603e33f543684658789d026b115b6804bb966f2726ac572f02d6816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503b53579bbdc780edadcd877be0a9e0c
SHA1411affa78bb0699c096047459434703127c5d1e8
SHA2569b83a949c8606a496727774188a181482f1ffa9403dd8a6e644ec8f792545506
SHA51240a90bd0246b18aa4f8fdeddd9b70cb58571987046a2a80dfcdf053517697bd2ca008c9b8ebc27f37b5a4f5c51cefcffa62b124ded0a331cada7387cdc5672a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538d2540c3e3fb45846e7636860d42e23
SHA10dfcc518c7234d9aee2143f65448e1355e6275f4
SHA2565f21f2210e757c77b8a9eb1880fa62ac5d0255e35a3df8c97a512ed51458630c
SHA512ff409c5fe8e29fc9b0e30dbfbc2077e52d73f6399746297751d25ba76daa3a5aee96acd22ae58b1995e78f953d519b1299207c9b942addec6f838d6c801ad980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eef4946cc6ab351f60dda20daa296519
SHA10c5b847398fdc18e21761e114a1bf2a4bdb51249
SHA2563816c978e2b6a0df89b315da30ca4be3cb469ac20efa2c81f573c267169b5d55
SHA51283729b8d4fa94619d3ee2cdd9d5ed96b3a05eac5f31164d6a3779a8742cff314c9e59d6ea6c2055e257af88eeaa24fd1350fcfef32326d2124798935d47bb9f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eca862436969189f474ecfef006200c7
SHA17c5fdca79093739e0e67b31b93fa9c1f4fd3dcf6
SHA2561ef1594f8344b370198795873cc048327bb88d81e0d402258f43484194382adc
SHA5126978067aeecea1f4e85d8f0a00918844796212bc708e166a6db37cdee2500e4e0333af8c499758d3230272df5462ff456465abd6103dacb287a0b19e9ac76eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5258f052567d7683010b24aeb53d816f3
SHA1294651fb208500113e8d36e816258e7ecf90f0ba
SHA256fa360625cc5ccc7cd32883380ad13f45488121b4c8049c4c95d2be1749348886
SHA512b2b5e906a601fd9ef5210c2ea12ec58eb5feb27552d2b1621f48b1735c5b8aca90fd31f2097380757d4413c1d6d5311bd5be9ded1c577e118c1b39aa4746bcca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5613ba6e013b32561460bd7195a7096f8
SHA154846eaed75775b8f6777cd9ed7bbf8c3891aeec
SHA2561cdd6d3faa2515316ba6541d6a713a5446a34e5a350484c64adec7fc80c2ea63
SHA512fb844720bf440deab9df3dec0592bdc5b6e8ce26147c21d8a94d6036ac0f86601092a632d7e31f7be2c7411e5073107870a57ed653b655cc53d2086a6348d702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ab23fad9ba7d9f816ee3dae52e3ff3d
SHA11106de00ff0eae1d8326ca0fb8a297e353ffb5c4
SHA25608197244583927f86e19c814f595286957806a41b90ac0403fe38f1ad776ad74
SHA512216bedc47b988819e1855486eaed3d46fdd74f585f046cfce06266df20763ba3cafe5f4f6ad48acdfac6d85fd8cb914d805290fb79f39f9eb8eb39450aa58973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cec57d89b237fec3b0d69e5f84f29d82
SHA1dec9f3a91b30668e90572c12fba65bb415cd28f4
SHA256e4b44a24977c323d2129c3011e14162139efa4bfc522fcd6ed1764af40fa03ce
SHA512331d588f59ab499df7d5d540e3057134c07c955fc2bf763edcbe5bf1addfb76b03ae2127b0c9451f021b876b231743c73e06fa888b73524341f0314a439e7485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1f166dacabc39b40bada77dc2ad06f3
SHA10c72a5ff115e548c25e19bc2eacf45098a938531
SHA256cf600179a5ff8edaf117deef1bbfdc62981812673d1d4b1d1a670a629a2d6c9a
SHA512cf6097372dac37824eb2735c7ebe1c4c514cd8140d812c9a71d01a38e46be60b3d541de7f79049315bb5173b491c38a49276404cccfeaca9d6fa3751e96ab030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bce9946a04aa1e1ebb6b1fc0785edaa2
SHA13d41734d6530c4324bf163606958e098a9e0ecba
SHA256763aff7d541506d40eb1c26efa707ce5084d0969f5a5de9006b0fb8d8aa8dc4b
SHA512d86c33ddf2945187de74985b9b267e4a63166a8669191073fb01ede72bfd628363e7c7756c56b2af59597ea108168238eb5a5858132a1db9f71e77bfb5e3d6e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5077823af8a7a3aeed32796e7ce08e9c0
SHA1071073bce87c6cc480c7a7db3cff510910710198
SHA256de1569cec260524fe5b11d810a1b754d434b1af318a7f3a0236434d604b43a62
SHA512deee4d448e7728cfb33f2cb84147c88868955edeaa6cee69226859d84ab0ef4e7e962ff0bc8f7b2da9c1cf0c1490bfbb1bb893a4ec07d1ef977ed0a683f4ad9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52139ffab92d325f0fe015f2af7b43ea8
SHA1f6e217fe062eebcb205cb9a1eeeb0da6d4f9b84c
SHA256223ab3a7c5de01e1e000c6f408f1c69cc379edb9458f16c44591d0f50cd07ebd
SHA512a0a643f2a910d2077c995e249febdae7f1d0b697747376d12bf347159666a132dfa9a952bdb99e4c0ab6dc6d22a5464c03c2054c084e1f65ce8c990122a64952
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b