Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
385a74403f1ae466bd6001640dda0e75_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
385a74403f1ae466bd6001640dda0e75_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
385a74403f1ae466bd6001640dda0e75_JaffaCakes118.html
-
Size
69KB
-
MD5
385a74403f1ae466bd6001640dda0e75
-
SHA1
5e6775b85859c9b6b24f17492aef7cae68a7ed51
-
SHA256
c39e927d0cf02b3fe21f8c82802c2da560cdcfcd4ccd708477017bbaa83ef661
-
SHA512
12366f792fe9e160310b249cc93fc39594a08477a4e141989c237f774eccfd2c10496612e3900e4855077f924ad9195602d6dead2a68890902396b5aa0a433a7
-
SSDEEP
1536:gQZBCCOdA0IxC9C2uevi5X7QWm547ldXXiRQvN9FtQI0eUZezlYVY+yYiEcUc5t2:gk220IxSueviX7QWm547ldXXiSvN9Ft4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000028f4dc04d8712cfcffe3da84da9e693f4349b8654326ac2e2cf74aa485b55dae000000000e8000000002000020000000915285430229397d82b44e8b1c57aa18cbd0fc5287c41f90d521b23341f3092620000000e1253faee2fd4f6df837c4481e8d4b6096fd0336b95fc9f8d5cb6791c67b9c4b40000000260cfec5344e5d52199fdd3a2b09f5c3d469266461df9f4e5a9a4f2ccbe01af685cf1f9ff661995e609dba549c75f8ebe0eaacb8c4d8edc13069fc5e3cec4f92 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0b33e9c6ad3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426847611" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C51A3441-3F5D-11EF-A372-5E92D6109A20} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2988 iexplore.exe 2988 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2100 2988 iexplore.exe 30 PID 2988 wrote to memory of 2100 2988 iexplore.exe 30 PID 2988 wrote to memory of 2100 2988 iexplore.exe 30 PID 2988 wrote to memory of 2100 2988 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\385a74403f1ae466bd6001640dda0e75_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0f8644cef59069385592e0b6084ba83
SHA162329e84bc163b3ddf7f387477679d0bd0d42ca7
SHA256e344a30a106ad16bf50a17cd041ff22aa882c65e4088ce980480bea2fbbc9bd2
SHA51243c99dfae89a982fbe6d2df09db67bc16fc1777fb3722d75aabfb3b7b68ce731973adcfc4495ba3033999229e5d7a8eeb00bca6bf58bdd52d9191311be33f798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ddecf2b5b731aa99130b48bca4023c5
SHA1628b37b3b9db49028f9024b0db3cb24ce3ed7280
SHA256783014052820a4c04550b44b31f75a35f8f63d00f83962265cbd61d72f17a75f
SHA512fefd131e392b1f821928a74bd512592b441a3d557bab1d3e6e7aadc2d07e7d90e3fa1e5d14283daea8fb3f38fca1e424370273e455d57c4db42b6fec982c4ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fb04ab8993ee67d29c039778ea53048
SHA1e7a6c9bd10d4ff584a2526d8c8087f05a2afbaac
SHA256c82131191cc6ea2ac014eb2b99d698005eaad9590149df4ae618b1b4dd27bca9
SHA512685a8dd943b70d1630bed0f1b953e2098ca5f481bb3c87ec8d6b87bdb91205ad9595ffb92154d0d1f65b52532eb1ddcdbf179474a6676e42ba3e840056308084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584a0326c97c74e473341c0beba4bbe51
SHA1dd8c4ae95274e76621e30df60f5f19676f21dc0c
SHA2565a29d6eda64b48f636d9cd69cae2a7486fda89c3a0c8d22c314afd391c10919a
SHA5125e7270d043abeb830e9681ac0f46293bc0fd7d9d53502d10c36566a95364785490278f9200f5f76c55261646cbbca31265f199ccd8b279592f657b5c1cc838e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565df9591e0d129881a5c9c83b0ada349
SHA166a199e2225adb30b3652ad2a2e9ea4b0da4b46d
SHA25641d0de7f26aacd7a5066d33ec1c6853c5160e9018c0d45ac507025f8f043d18b
SHA5124aa64b74f579e93b6c4bea667925a5072fd65acb155f1a26fd9898814e5aad3efced3449478b7088ac205812333e884333b5cf870d057d5a2047996b3aeeeecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6b4eb432d28d60ca7a632544b4fe86b
SHA126cfd4a334bc949e19bdc0afb590012e8bf2f1ae
SHA2569c76d437d238d464b8ac675fe3b3ec2618164627bc3046564e343acda07c8455
SHA5127189fed0d9e2e3370d1c9176fb54ddf3d9b345b57b66a03258bca3bb5c1724fc0bed4515dc25772d207881de30f32d5b701c6f7d22198721e678c0b826e29894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b09c079c628b5c29e0cc79b0d60f289
SHA1163f96787b91a50badab59c5c051136719cfea62
SHA2566c1abeec74b72b46aec7bd79a408434d67c27ddd58dee9558af1826c32bf0644
SHA5129ef847730e1f4c6482e253c0ed7d82596443f739b463f67fb943ff60c6a9039ba1ee9e912d04bb09f1a5ecfcf903e82dad771922f962f77674c990a8b9c8e7cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522b15c0e6b9223d707ace0a00adf7da2
SHA18d73825c541700d71313fccc4f27e1cad8eb4077
SHA256fd9380a54dabeeab37fc4f9f1758f3c94960d8e9cc1b8c0bb4c97b8bb5d4173d
SHA512a547de4fd872f3c8d74039f34793ea75e6d4c5bf8e6b7315b3eada795b61fe9fcc9621aa0ef30f6cacc4e949869ecf65d9e48656887141cc51150b78a6911787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5320442375f7714debd2d10235a2202bf
SHA1857513496899557dc5d7dde64b75069773905eb3
SHA2568a6c6f0deb60320cda2a7ff40e98778fbbaa5b9b022d540a00e38f2b7b3f4457
SHA512d24c964164cdbb569d8b9c11cb4387f81e96b0417895cde3d4f9ec97f17a1e8b10dcb2dd0946e1988aa361f2a25746ab1bcf46782a177464ca3d25f85caaf520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b4e30d0dba4ea3faa9bf9ed5c825a30
SHA1758696b3dcc669e9ceeb2a5dfd11b9b494f2537d
SHA256536f4af5b8c5ceb9bf9f9b04ea4b9f61e7fe311646b75b78b417412672d610db
SHA51228eb33af8003ccb712d9ecd545c96eedeba96974f8ed239b413402b2e8783c351f71b3e97afc2e91c75652946cde46ff093ce914460d44155b9a333674ac9d0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58822570b6593dc83f33867461343647f
SHA1555700e579f4350d4588b7796280c982f6980a91
SHA256affaa03be79712b024c057c7eb5fde940e4b27a5fba5d88cf5c09d3369adaf32
SHA5127acf175eff26b02526c7db2db6f03317eb28a94d600c3592a203c965af7d0dedb5529505891e4411b45132f44a991b1e5475c2098de40268926739a94a741e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c5b904e8e5270bb27a59893c753642c
SHA11ed362d1583c76b4effdc0a9ccea3624030fe57c
SHA2561e35582b0879827904456229f5ea4bc434b77d44a82f4a95b32bff8c290d6d70
SHA512ed590095a322289d76754b1a1d84426494880c9d5d5317058e33d3b9bd8a6080401d3cbf8b0fdc8efaa25b36d58f4026ccce32ced9a8da22791e853a465588e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b182069870a8bf67e861845099e74733
SHA14261315235e9e04e6044b6591d892ec3a5a047e6
SHA2567cd8b4544fc8ac74a02bb92433e5025c6f15c61165c06e62bab9c3f20da7af70
SHA512ced53bd1c0e1d587a2c7b098397a68ff6a2745dcf682c49adb2f105b679de21d3835c405b54586acad57145dd6645b686b6d453907ed39d02cc8d2a95814798b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59af25485fa207779a9734def61dd4859
SHA16ec70c58239bb796c103413ff06349dc80e42182
SHA25637dd67f72cf0d937969685ac22754e794a2121f08b9a912752bec1341d2ed474
SHA5120d7180650e75ead76399c32fbacc60166b538bb46b81c30cb5ba3c77da199f46a672ebbf81d6d7f7e021a8797b1cd1fbd82a65c1274d902537135e5141f013c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e45c20a6d8c35a0b0f934ee8991e68ea
SHA176b88c5a48c6dcd41e4e8fbe66a93677819cdf38
SHA256826320128cac04ece371b8fdeede91d894f21a58337b0b7eea4a164a0a9151fc
SHA5127c8b88e4017388c13992a6be06b7aa839a4db6a125495df28fda5627a4396813c1497bd8ce0476c29cd53f30248800c26a06cc986cdc28db0f5b340aff280dc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568bfc77f8ee0111a299f7f68c8d00124
SHA1e0edc67435f4a90e85456995b5fc1fd3e443ee7e
SHA2566f354af4e29c2f90df94fbf57b091c0171cff737a97b78765781943af39a6bdb
SHA512b41587728ab9f84a0ad9036751e34e7bbedd79172c680aa3e0336a72661092d9f4057bf33b0762bad29d8d7d2e282a32373bcd754e7c25bf82f341c125c19d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56876a13c91c16a06aea9196608fee1ad
SHA1f0f4aaa6a3fec418b181410ffb6b322e48690403
SHA256005319d3911dd50a1f139529e38af4f937eda6d075464ed920dcd67b1db6a4ed
SHA51238251ba5e604211fa72c5dd8b86e3d44b0cf103e45964d857fdc6b824683e7d21304397624b9ad1748dd7caeecd9527a3e56c0f8fef0d4ac1ccd9bb8c0945f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c12387c7166903d9e3cc12a3513967c
SHA133e4c813b6ffbaa661017de3d88682dcd863d15e
SHA256255083e6fb878f59d53887ce416bb2191aed222bd1e71536c8aefd325bc37ebf
SHA512aeae83158ae0cf79cb1223a1d906c1183f1eab5476c07c069ad8ae58396b6f2254d8fb5e77e188a7d6d1484d0d4b2ec9c91fb6fca568d2db04835d1cbb7697d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f85ddab1abe50d3d82622d172795d1f
SHA14fbcbc3f96ae0807d98b52535a636fe02b474665
SHA256bb7d35a6b855e7aec4d361a445fcd7b038cf5ba5b6579dfbe34816b4f29537a6
SHA512f598493c936c4fc1918d1b373c9185bb908c22e2c4a5eaff75ddf4fb3c936a510bd470acc50340b017dc4ad00c09573c207af25d3a045e6332c0410bcfb3ebb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531ddff8d67a17a8cc86623b4c2c3a638
SHA18a826f29cd11cbe456cb2508eb9109d78732e862
SHA256618c2a2bc054b5a3d5afefad36b4bcf2c61d42cc81b6ee7d02f1a2f27bb25df7
SHA512894d4726fa195e8cc2c778d05efc043e10973e5d76db100ecec29f5a1edd3c406e114a2fd4374bb52bbf586465417b989ef3a0ec8421bcce88b0901288d10ec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea89944a45841d32ecb0f66446fae173
SHA13eac277b93d4bee043ab29661976bc7441dbd191
SHA256caa444bce4bc8e2a9c683ca4e7d892182305bcd2ff52331e377e028a700ae899
SHA5123e2c77b01a3550ec46025adeca9f2b79d47cc4199deba4b556788bd31b3cddccc4b835372a3a6d610234967dd81caeb3199a166dcfaf45e3461c8a1736823d07
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b