Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 21:11
Static task
static1
Behavioral task
behavioral1
Sample
3665ae3aec7f7f24496fd021dd29617f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3665ae3aec7f7f24496fd021dd29617f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3665ae3aec7f7f24496fd021dd29617f_JaffaCakes118.html
-
Size
34KB
-
MD5
3665ae3aec7f7f24496fd021dd29617f
-
SHA1
7929c1b090779007952cd3f13e0f28dc94bf0b66
-
SHA256
70ad2ef0c167ef7afb71224df676faa7bfa36915c08b345996f2394dbff2b856
-
SHA512
d2ad797103889444117dfc4ade4c91d44d71b8294fa6bc0b9d821ad84d9dcd8fd4b25c00e634baab1721e750279b305c191691e016632cdd270d5c58e3436df2
-
SSDEEP
384:DnrF7XbciOaXy/WBc9cW+L+jHhOua4+zDBOWbu4D4l4T4A4xX4x58xl5kO6pA2pl:3FbjS2m/+PuOv8+sDxI8U9OqpN6MAsEI
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3ACC231-3F00-11EF-BF59-526249468C57} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426807746" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7012aaca0dd3da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000004a10c7af03bdbdf4e59bd4da132f1afe291634f8870022eb307b6ee25d682021000000000e8000000002000020000000034430d75f1b83731799e679adc819a430dbb9133e96ed8e5877abad46022b6020000000fcadb0979a0d6155b4a324e39f7973a8bd953c328416b49762c135f6c8a26a1b4000000057995ef5e50be5239d49551405764484b81e5fcd2b9ce0c7f9d16f6faca008c85b641783a184a66b8fd5de69c302fc9dabf790c6435aa3ac1debae134fad4dc0 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1668 iexplore.exe 1668 iexplore.exe 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1668 wrote to memory of 1804 1668 iexplore.exe IEXPLORE.EXE PID 1668 wrote to memory of 1804 1668 iexplore.exe IEXPLORE.EXE PID 1668 wrote to memory of 1804 1668 iexplore.exe IEXPLORE.EXE PID 1668 wrote to memory of 1804 1668 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3665ae3aec7f7f24496fd021dd29617f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0a047730d7d43a68840f8166acafbd8
SHA17515bfa49d153c1d4b72e229e01ff91ac073791b
SHA256c667c895ae8fa963b2664db23fcfa3978e0a1b47dbd54966993a6c0a603e7502
SHA5128e5af12c29c1f254ee11f2a10a38a5c14284f70103b6ae0faa14ebe692d0ee6ad8cb539d4e4f0b36f92948188863ffde7be2501630a9b5885277c54a3b37f7cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a43caf77d2e561d50ee7906ceefc44
SHA15df824e622635d6a6c40f02254ab416dee0d657d
SHA256b31f4091c11d47f645c7f908cee5d548b92601369b6c2013e0de5b2d83347a41
SHA51268969cf7355de19453140548d0a3d6d09a2bdc739a6c6a9677482897c794a13c6443cc5cb9008b8d72bb0500003af9868e6c4bbf672f322cf0d5eec1829855fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aa3e124b5d878943e3ff0fa655c4fd8
SHA10f3acc728e704307c211d1c8437b9e2c05419a39
SHA256bca09168d1930e4e1e27c772a5c2c218604021b4a20646acdb8494da4a4e4856
SHA5125303f64ec37309c46e4eaa81e94479735269c376ed740b3b668505050d0086b178f973f274d0c91b8013ebf726221dcc08dc7afdc98534f20c737cd1eaef1a0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579cf8495692c763f4605ad077a2df56e
SHA1eb75da66ae3c2e5aea3bd6b29fd09556cf3c19bf
SHA256d96ad30bdd3839da55b7349838054ef5cfa7634c9e394d9c0dc3389b5f0e12b5
SHA512a45951f0a1d254a59acdc6669fa757cd981717da9af804c5e1bd736109639504e499c6de1bd92bec023a990c4a4ab2d52bfdfa12a8fe3eb42d61b0c71d804044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0575c35fb3167bf97ff151d1ab2a47c
SHA1e7d3851eeaf62c6331be2e87cd1a5ca4ae5336e5
SHA256d38d333969f6bb6770ca301f31d25e20126c52594eb0aee2826ede87e4c0e0e2
SHA512bc85e183a776cd34c2ad425f2aef02e78629a3f8f2b50537b883af1b5ad96edb5aa62a930df967e4f629c97678c605272300d09733de38d42869051e2e5efac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df24919e44f3cb0ee5d9646dc03bf736
SHA1f59c37421452f1f147058d881bf7ef3791080e4d
SHA256f99a7e3866497d012a2bc4665e27bac2c1a4d17533d8f296bf983ff92dda9a21
SHA51248aac0b28bfb5c79cb9bda3e17fc9e42b3ee87dadf833d91f1e9b2139fffb3bb3d7f2ab68cf6c3de6eea1f17a0734d6151b3211a48a394ad9923230e30463922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b836a910235dea02e737ee5724758e5
SHA1c657f6a3418a0c4ec3c2c89c358ce9aece2730df
SHA256a38fbbb33fef8cc37ce4635d78e71cd59686bee0d9b43a74d8f21ec050b15406
SHA5122f9b9aa746e58dd7b1a9aafe555f375c596f83570fc8f58b7803a14b923a39290ea5846a7de43bd965219136eb3d5d5f02c4a9123ff6669aafe7d392e44a64eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5507effdae7186b05626d60b90ab79a8d
SHA1a4e875a95cd2e1a5fa630f69e6f29ee173fec4ee
SHA256f788484332b92d2fe6683ae30510ce3b7719e6c99b3f3c437beb41bd01015104
SHA512fa9ca30bb1cdf363097a98a152efff640147e000bb68d4ff560f406e1260b9044b77e7d753c3fb5aa68617a3ded08d807c2ba526caa639b6ce8b8bdcc84aedf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547dcb42013c1c68004328cd81f9216cc
SHA1792c3ff0d6824ead9c70b91731f22b5ddd4c4cb8
SHA256d6fb767f22435eeed1bb8a16d0df82ecac071f9e432036db3a10af42e38da23e
SHA512dc19112d0b4dd831716c0257bfe5f293dbea6ae051a9a9a4bbb2914206c9b8605a6c40860826e0190ef9f7728d24d9d7b61f50f0be4be46bd57c94a12320d39f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d508e5e3576fff6820db0495f34d44
SHA136d632e269e37d9c97d5cede093e6f797ba68453
SHA256680c5d9384169702c7f1f6f1da8fba2040426d2d08808e1fa04a93ddf0b5c29c
SHA512ed8827cfb4685fbfe9b105bea3fe5708c5c50f4d22d8875110b3cdc1b26517da7237c1f2204840a4fd58d10be4d705e4e1fc7a5241761e414d7ff2fb025296d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596104b9cf12bff2cc5d2730c7e4d9eda
SHA175e1c43b9e59059dc2d18c29f05f7aef588536a6
SHA256e64a75804cf52bf6aa1377be49096ba8a911523321d707e51a170a106765a2e5
SHA512868b7cb5e55dfb0a3636739f2e10a529e2e9f53ca60af3f25223f2b09a84bc548533504eeab8f84d1266443665283e72f53b4823895a18abf99e20b7a68b278e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c60c5fcb46737be0e411fd1086d63a21
SHA17a486960a96420dfdaadc6656ad566e0dea32a49
SHA256461f81dd4a63ea8c53ccafc01ea48ec8f947faef5f4c4829948c12b7bc3c4253
SHA512cc90cbb5e874d2e29e0590a9191f67223c90987399f407bbd964341ff1f5f9eee5464206960a263a7118ae175e0671d5695e626c9af53ba0261598cb7b878f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb0aa4ebfa9d138d2e0f751b993dad7e
SHA1260b64623ee32e437f9394cef10ca003f0e82e05
SHA25640dae4f9ae93e9d796f75ab8b09043eba030f2c0af724f93160e7ea41aba4997
SHA5123e713af51ec94d33cdc7197b980f1790b322ccbbb53bfc86c65e407a48f4ed5189f51414d059d147f65eb5ae6ffe69ebb6be4b15af316a9a3185cd5661956181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9c95da5783dfd0074cb89b2379d721d
SHA14c388929ce3e3858c21490ead574b60d97295a13
SHA2561572bf97b8b409cb01f7af9f99fd65b415773f153e4d207ab333187e708a64d6
SHA512e6c8e22d156c4a905dab4322abf2d26b82b4cbecb25c8b5c95e84e4730a59344f13879417100812949fbf4c1228092255f2f60d7f478230676d0381aeb7b7c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa4fcc4c785838eb956fa54979cd125c
SHA171e2664f5c185cca598509f919283541ef2c302a
SHA256a22e316d5483d4389632db2742f88a67715813b6695979ed183bf8721488a3bf
SHA5120b12905cc20cfc62ebbd716996893380456ac15c78a7c744796e46119dc3c6acf5c3aabd127d45749c59be1b2423bd2deff7e6a485bbf36534a8f5b2df035ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b43f4c4590474a7188230831522408
SHA1f9bebff2551a0a931f3a9f30741e99d66ee0fdc2
SHA2566e0e31b952f611b49342e1def905222a4f01728703133942db078c7143b2c2c9
SHA512c720d8337e6b9d74b43a02d1d8e01eaa1b447b2e1fabd251353172cb677bbad0e8ab6ffc6f5c4aab67e2b66130f65457dae59abca58e8bf3392143dbc4b19e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e240b83f96058afe2a535cf785e4110f
SHA182c471444890589498b9ff03bedf6dc8ea080bbd
SHA25692bcdc1ff86f2931088dac3d621846cb816d2c05ca03e72e9e34b885967f8abc
SHA51259e45c9d522f2697091293a2fa4b175d6c5684c61608fe26935ac7232fed64f6aba4fc307ff6defb9eaccf6956f87eb29f1aee8b6657c193bbc29184b8dcb752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c252c3b9c788dfe919c15a7a2e573009
SHA1633641fc263329585108678a602b23e55d418cb6
SHA256ab1ce0cb88a292c0a36c91c7f094746b641b8f39a819b6430982c5b4da330580
SHA5123408f8b84bff928538f0e3962e808d9629682f391583df4fbb7152eda00b18a194e69c2cac92ef4f31dca196e0b2ab75a16b3f54b155f6952e613ea968a79455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549137401c9bbb58858ef70745990e3df
SHA18c32547e5f7822681a536054b2740918756a737c
SHA256331426876e1c0ef7bffc6496e4b7fa848317033d68752d8da25a83ab092e0b29
SHA51278859ded0e6b6f20cebfe87c2f94a72ad88110e4966c6221d9f1df910093b1a52f162e3efea7b4efd5fc0e67a1776abdfd1ff4b69374e13998f8fe86b554ea45
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b