Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
0f45f8fb386dc0127a2904df7feb68d1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0f45f8fb386dc0127a2904df7feb68d1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0f45f8fb386dc0127a2904df7feb68d1_JaffaCakes118.html
-
Size
53KB
-
MD5
0f45f8fb386dc0127a2904df7feb68d1
-
SHA1
22079b5e3895d53271dbc25ae8abe9d8c9a1362b
-
SHA256
d6d0e83ec00d539ce82cab3842caa50cec713eaec8e9d37c90f91f162f393779
-
SHA512
a5471b7b9dea0ece565b4ddfe07a583f632b4bb62cd8a7c16c99b838d25c41cd439bbdb9ad65095a5cc606b675f72b5df84ce64487d6f87a1b36393e6392d182
-
SSDEEP
1536:CkgUiIakTqGivi+PyUPrunlY463Nj+q5Vy0R0w2AzTICbb2oh/t9M/dNwIUTDmDX:CkgUiIakTqGivi+PyUPrunlY463Nj+qw
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000007e173572d2919a9e567ae9977c9b5836509ed90c9d2cdd1f904e46b529d6b77e000000000e80000000020000200000001ad79ff75c9998454f73ee015014465f338c8ebbaaa4b8f03b4c6e9bdb3baa1d20000000cf114019257e9a3db25784a59d368a98c1bc17a8a9818a193c46f15bd371f89b40000000cc8668738d207022ce348273a5c6c24c050f371cf3b34adf36e04fc689d8d1aa7f791de8332abc488bafce7413895d5fa17e7e7e38167fe2776578e05217531a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425506083" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70ce5a1d37c7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{481C6471-332A-11EF-ADEA-C2931B856BB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1492 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1492 iexplore.exe 1492 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1492 wrote to memory of 2176 1492 iexplore.exe 28 PID 1492 wrote to memory of 2176 1492 iexplore.exe 28 PID 1492 wrote to memory of 2176 1492 iexplore.exe 28 PID 1492 wrote to memory of 2176 1492 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f45f8fb386dc0127a2904df7feb68d1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1492 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57111f0bcd89fdde30d8b63e83829e230
SHA11f85d770e83aa051e524b3474f9dce2d02aa9dd2
SHA2560eaf48c749214925c84c624dd941d9d78fb8a5c0ca5f58a5f4a7a0bfce082e38
SHA512d01383cfc5daae3758b3f99b36c3510f5a91adc3aa909aff9a2bf8abc4b53a7b6335fb45a7179cce8cf3ddfe1f74b0601cfbf89f9e1e16807abe57489f32a767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d17cdc803025bd0b9a1fcf7fd7e0a9d
SHA11707a2dfaea4e06c9a5aa8746ae900fa5997d105
SHA256a4c185985e753cd42bed0c5926fb4c97ddf0c68341f8d8a8474380d4e94be310
SHA512bfc3238c2605e7c780f229ce3a3b1dfaba959114a31bf141191ea8528b29b0d373e5be1bc24495f2f9aa2ebb43d2ddf250d5c8519b11d18d2f7eea734d9b6c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cf8a829ba2bd899635922e8ab226440
SHA13f9d9be39e5c2d05ef9a67f30341958030689341
SHA25634ac729b6dfbb242e10d43fcfd043292c8c5239d188263555c134a6ab86d4ad6
SHA512148b60df1e06a1987e32e6cacf40842ae7326bd4381c6388a19a0c104b6a4df4206a099dfb4b8235b1eca0e91c013090071e124b924c9450c23b6974a7ea921c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501e8ca0482618a3daf560d3dfe490e1b
SHA148fb75763e9e665aa7495f63ccd93ac13f030eed
SHA256cafcb6bb1fd0b0312bf6e1d1409614939242495c86a3f7b9cbc17780dde3e603
SHA512fc353f9d3c0cb3d6a83e42bc570376f922f7c433bf7c0a15d4eb12ee75e713695f07ed1d14b5b907be17146c3a39c549497346561271b45812641eee5ac2c953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6550e3822a5292eedde2080ec84d038
SHA11a09925dd3af61f80f40f4fdf69809fbd198edbb
SHA256e23dc5964ab8bcd8ff4a2351d3a6208ad5729ebf49e1575528de5b70e489de29
SHA512d3fcf4ecd65c4af4553ff91636019f834571cc2210dc0640e81cbc01209c7684f5b2986de093c8fb765d03b0e3be419f1d47149342a16ebdbe6e9df9f6717501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5036fadad05a93f4b97e69ccb94eb12b1
SHA18193c8553b10634bee92854363676d81f624d94b
SHA256765d18e0c48775c6c41e6ad370b4041466523f1f315a49c9d2a25cc9773d51bc
SHA5125d3a780284608819743192e9c9db004f695ec618b7d9d3173f4884140584e305ab625317f6d905e8df2ea0b80598ea2371a38fa5f77f81a46c10cdf2693df335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c53df38d8ecafe7e82501569ff0030c7
SHA1f9a3338590df11cdf600172595fd0f832f979ed9
SHA2565d96df349e047df06c81150be27656c1c24754861d0c1bc4112b2ce7ae516032
SHA5125bf9ae34870bc7a5d1507a31329029d72e42f30a4d5b8710b55fc4015d0479a98a68ba478811d8b56663c669b802ee5258a682d52f9d97a1a455636f6d689c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5637ce2b64dc672fb4c89e11d43f49e00
SHA189a4fc551c41651201e9df547d51f02e7564e485
SHA256ba2c8b67923da1484bf084719bc0cc6bff7807fd1b9da6b43d55cbcc853c75e2
SHA512bbd4a7b4b690249910d796a905b78354a443c28f4805b5fa5cbce5f6db1e2c6431551604e08cc4e8d06a6d00bd4d8535c18585123d3eb15e571c394f95a8549e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f2ea48bc593d801e6e90afabaabbf3f
SHA1676f8e4a3d41803bb12d6e22c87a11cd1706e4af
SHA25624d33e691d7b1f76a6bf36216257ecdae1978025d000d4bae75cc788559581b6
SHA512f934d03d2a3f62e43b464be5663befa819841176bde6ea4746c7aa4c66c6b8e2a7d79aef09572f7548923419bd68d20d5d3d065b86a9b15c3c20a356b8384c55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57469c9adb3364ab5f6097add614f46ef
SHA14e82e6e73b23de4fea7324773b9d89c356a70ef6
SHA256be4041969c39561b41ca22283c0ce5d9b1846299aa6485b393e1b0f15bf08c9d
SHA512103c6295c0873e384aedf8e8718be5f4e590a1fb37102df8476fbd6d4859c6a92a988ee5ba7270362b02120ba4fd322eb277ffc981c0dfd68ad3a76b5633c155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f239f8ed9784e979ea1fa3468e53411f
SHA1293285a959d5d291563528d6911951e4ba4c445d
SHA256938816df1e46091d6a7c07a69caf781cce54d2be4633c3e3bc5941b9b812bdad
SHA51289d6d16775298c25f43094d09098e91caf3fff9228bb0de7b7991957e7d2bb83511d4f9038d5ff5c764de3576e7d8f04edb434f101a4f1b764b90d598a5cb32c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5461b641445c0549703da8b9dc3f2792f
SHA10fbe7f01cecb6db154d2e1d30c7235d916b538a9
SHA256e0f381f03c8cd06f410c4cc9c87c8b8830154f46d1e500129e8d704a13a8e660
SHA51266cfdfd1de88ca970b2bbc22cc82df360a6a6dd68897b8ef0ef4b73db6892fbbf3adddf6a3e637e8aaeae98ee43f079a86098695955b3ede151d85fe95521dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ea62f4db3723e4630dc50dc39ea0892
SHA115cc1937b48df73489704e93355e2400edcc3b85
SHA256476431843985a51e84c7d641337182713d435e8ffc672443301d05498cfd5da1
SHA51229c123cb41622883364bca6f49c3422ea96fd4e63c0e6a9a45d47c9a84b6fdda3c55ed90f5d1351bf8f74170771952decdfd5efed09d8fbc1042bb17b59e51e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae6781b75133ffd565a7904072a4268b
SHA153d7a8f2a6fe713c9986f2c96f33166e62416c11
SHA256a343a771b0c93eab6d3e54334055db1bb3711b6bdb80d3a30c9302559926632e
SHA5121d24373850d7fedef8235eb9aff8a2c201665c04ff186c9b878daef42857e6b958f291d4353bbc736469a7b8a9bbd79bed66dec22099ce0bb100586539ec847d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d97a801e5ad9560768d6dbb7e64621
SHA13801896ffc3ea4200c91aa67909afdf2c8992527
SHA25665f0cb318d18b997e85184122e8539f57133c85eb0481ddaac686de8a2a914d0
SHA512c7efff3de35f748b394466d6ed951d89c54bddfe0fcce0044ac0e3a8a75a8c59502659face62d60e5fd7c0fc25d9ed622afd58dd4c9540252a9329d6607b9ffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519eba13217ea771eba4b4fda039c42db
SHA18df2ece51f5d981bc1d485019c13a44ae1cb9e3f
SHA2568fd493211a77c5de06597440d4ea74122e8bffc77902d94f053d4f4467ee9bf1
SHA5128b8ab125816c6930dbaa0e3045cb5a5b89c399347a04c29beef64c29f682b9c99d2eee1b4a131fe8faa5552e7da8727652e2c79f3b6fdf18e23d931f745a82cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523cd1b3eef898d321d4dbdba7a3759bd
SHA11f017d0b79fb03897256ebbea8b0a16ef7911b8e
SHA25672e81e8c0ac37245ad84fe23d957b8d01ceb3e23bc70c90c8a8f0a1a0078c963
SHA5122c6aa79d5133dc3c26cb9e15df00ef7946ff5a88261cdb76fda5a0661d74716ca5e618c45917e6426bf9068a1f6c4fb9828d7b0ed42529143819b04d578dd06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5281b4072601d374e8d0f77033ebe8d04
SHA1f90a46500de96e49a6fe7adc5826d9a596f4fded
SHA256fbbf36c6376a495ad37b5808be88602c1f795b3a3edaabc69c5f35f97a789378
SHA51228031f533af1909e6175deac788c23671665e6119f12e509823adba296be4c12da956e607c3a8faaf275350970c1dc60a80b9b89382f91bc29d56d6aceb7ddc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e97badc9a3f5df720e0123e2e314764a
SHA139c80b2a6b0e6dc743f1893ca6553657d7768ee3
SHA25614ebfe4acd67e7d6702183753f051542ded8b22d0ab2d1e4cc32944e3e90ca9d
SHA512b4edd06709f5dd20951d7579ba727d1b6c19ed4823e24550196119fcdd101ff5fd28694b935f1e3af398a38e7a2291c2231089bbc3ed466edfd499b7028622e1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTL9DZJ3\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b