Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
829ff416427613fa6015f2f36b06b491_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
829ff416427613fa6015f2f36b06b491_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
829ff416427613fa6015f2f36b06b491_JaffaCakes118.html
-
Size
3KB
-
MD5
829ff416427613fa6015f2f36b06b491
-
SHA1
4cc6429e05b62c40feff50fd41d182292eec6e6a
-
SHA256
38dc39f837b81e5b45f243ceb399c5ef04d2a26660e7d40ac501cb2d013e197d
-
SHA512
9bf9b37cffe44b6a688de1b4b52e19aed4a42db8120bddd4963ee9b1f438a4b588c2ad8580d0d7db08bc9b8648f86a268e2043af94880e88f729c8704091d4ae
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428726131" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b08beb5f80e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000031d20a094459c631424358ceb60fdac743d998f47c67f7f49a9c9307e8766502000000000e800000000200002000000063a0619ccfcf81676ac43831a99c386430368125192a4986e2d17f6b76c7ae44200000009c46fbe6ca925cc19bd8e01a1612aa2711858137409675083689a15b1fbb17a040000000c68c76eda95151021efd3e7268dc0cd799fdc6af282721067b506ecf83d433441bc64389ff18f52753ba1c9baa96a92c23faae83aad4200ae0284455e1320b32 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{89BB5741-5073-11EF-BF10-EE5017308107} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2996 iexplore.exe 2996 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2996 wrote to memory of 3016 2996 iexplore.exe 30 PID 2996 wrote to memory of 3016 2996 iexplore.exe 30 PID 2996 wrote to memory of 3016 2996 iexplore.exe 30 PID 2996 wrote to memory of 3016 2996 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\829ff416427613fa6015f2f36b06b491_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2996 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558cba1f1b77a8e8a2d8fa71b5e27d21d
SHA1389345dee051471ee00f0dd724ff0bd16ca1feb1
SHA2566617afd3060bdcdb5b5468df592dabed78d56fa65da64d9be4546b9d1f4e7193
SHA5126bf62a658cebedecfbf1bffbab362e6976165414d671761d8e7777efcc42fb926e498d1b328d7d78777fa7611473456574368cd4c417036bdf0598d418cdce40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52380ff9166a6efd270363d4f82a7f819
SHA1273d305205e7b1369cebc4c1cecadaa81302408a
SHA256b5cbb8c8c2301cdcaf163d8e4629b78d388d479075bd24ab67edad6a1df700ad
SHA5121fdce587bd9cb4eb4223479a30c89bdedf13d81af120d91ab7e194842c0cef443ff7d7ab37a41c93372e392ece136f4540ca60d4218e62fa835cbd12269f0a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb0f960750a9e382c58f5f8fd65db021
SHA10479b949c49f9f0151d3a8750885078acf4c68f2
SHA256d60539380709c5b9474fc420ff1ad2bdf40b624d28a680b3f7de2cf12d9912b5
SHA512058534c4dc8719770efcdc7ffd3a60fee10a5adec6267cb14d13069c5fc542198ddbe7379c9a022e88bfc9705ebbce24a83e5a560d9cf78462f8166371edfed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579bd095d6445bd3cf4fd3d2d35ad358a
SHA1351475e8ea9635b2aa1470a31f77638cc1fe46ce
SHA2569fa99c37bc58e017a3184b3e9e835e4e0e19f59b59e2f640c4b5ffe718ce80a5
SHA512e1964ed41d9cec7dc998320cbd5a9017456d1988fd2d40ae4f4176f4e3d90463515c936f090b0b82e3a0e856581ca8f0e20cd236e0dccea3ff495e868d8ca3b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5386fd55eee640f6f9a05efd3fd81391e
SHA1dd3ec1cc3037a954409c591f06e03096493652de
SHA25686bb791b9d050100b628e0cae5ed5aa1c993a56d1c8e387d36be43dbb1ff2672
SHA5122523ca1599b2b17548d069720864037a61e2ddb9529ae148d2e8793077c5edff024197b4398be80ecaf85778f291b14e1b5d61e11bf21b971fa91cd2b861c0fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5009a6751cbc048f5259b3353c8cefdeb
SHA1cdcc830767fa7c4c7f781647f070cd004a1bb1cd
SHA2564fa5a88cded9029297efbdb26909e379a4e13e05c8fccc28ff345aab58efcaf3
SHA5128ee5dbca3046bc4909e35258cbcf8304fd11b3304eb11abf0c2fb1df9134972d45ea78ccfe7a4400c8887689c4b30d42a97a4db0fb63681c943a53dc42bd7ac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427489bfeaa1378a04d84586555a4837
SHA1b2d1c05d90700f5a0f0f86dcc212502221592f57
SHA256e36bb6e37dd2e8cc04f9561a9014fcb5e7a88de793ff419d757a5840e91c1597
SHA512a7aa0cc54449d82851732ab951190213d21d2d6563223fe999e03c8646fa2829e17e2d11f76899b469d58f8a41738aa4596520b010dd6d9e0f8f958158957a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5495ebe6e78da29cbb094ac1c9342cfd1
SHA1c2cbc385ad1cc48a463bb3910d8323045eb5b12e
SHA256d6ac10e689fa82c4de51d153d978245409aa4f584988f463587d1ee5b0c1e0f3
SHA5121146bfb5eac8c952fd7c18778d17527cd4152ce8b50e93b003c802bdf84ad4e63353c0feb2eac98ad250120a73559c02faf1ffd32515e3407f1ffa6f4e736556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b436f16f77f016335748c83332eae09
SHA1f0ce61875e21c9519f415996a34498940eda6d1f
SHA256b251f37c38eedd215bd3655cfe6d94fd88f79fac02bc2e1a7e1e64f8c5696cbe
SHA51247778e19b23fdbe3b7abd25c2b56c3aed0d2904321e10f28288e292e67902d7b0c45ef56bc0cfad51ac224d6bb205dd859392568a6f1b9c6c7b2983b3c5a6c3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518da002828f638d12002b2c3e683e01d
SHA1c22a23e5d3777449dddbc4dd6f1fdca2c3546c6c
SHA2563e8b42e9997c52091e6bf129a1aac5aa265e7104eea80deb85ce0b4fd89fd2ff
SHA512c08b868c7cd0666c8e8f8fec1f742ce2e61e95bdd49473e05e02fe39069c6d81745adefe238f8d6e35db201b854cd81378db561f75235240c883df385fbbdf60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ead72eb43605689c5daaa0990c443d88
SHA1a1bd264913ee9bfb3f672ed3b401695908fdf774
SHA2565fbde6fbe18db61b9e8efb02f81dfc138948ab25adb7aad7aa6e1bb20ba49b8d
SHA5129174700194950db5e321e8b8dbb2e2e1cf34fbec895db1e0ecb535ff15c9b8c266b510935c373da0cf7d43251a9822e2cdcf061ecfed1a992c3e6b45a49bbd3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d77368487ebbc151bd69aa57026c1d
SHA1506e267d33fc980e4899480ab992e3629df36056
SHA256bfcb2f37176fd1bc9d92b1801192a2b09b35cf4d5679f0c2f1731ffe7133fcb8
SHA5121e2c96caa60d691b85fc144cd724a04764610de4f4318d78199aa212705ea4ef911c12666d229701d6d86f1cb970c8a0b807c22024db0f53575981f7bd341fb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cf588e980381322f40fc812994b4cf3
SHA1ca74d137b68cdd74989b776e87b7825dcf5c8d99
SHA256d1478db86e6fb1fe08762e7046f97eed1d80abaa10a330d5403fb9e30a61fa13
SHA51240868bda7571b8136e4364549d43266ba12cc5463430b4e3401060c9340be12e9d9f78b0192942afd253b1e093a39d604f2080af9b415ffb3b7c8c26b9024d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd45b3bfbfa05ad2840af8028e231da7
SHA18d648d5a14164185f66ed5abf01903e702200d3e
SHA2567db2b69e375346630b03cee5671b5c46b046dbd0a8380ebf02b42b1cb79e1ad5
SHA512dbac006466d381cbab05ada8ece9407a8e582aac98e5b3fa779ea517f205fcecff38e31f6fcd398b7c15e0dd301a26b9753a3b2c752602c48308d3e2062e5f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5175eed124f8add8d1c4fcf608b7923b2
SHA1310f35b15720fccde6fa1c94618f396d0aa7afc9
SHA2562ced1de1628046f06ab0743b25fbd58d6a5571a80423c5ea460c36823e7f594a
SHA512184a4f8f6ebf5e8540b5dbe3180b4bfa9b74929bdc641fabe3e223fe15aee5dba016f2c199e2877c978bbd4d809ac6f56a40257e6dab54a5a74d7faf97186af6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e0401286bf4dffbc0349bd4c47c15f5
SHA1140b827c9af350f058fee537781f59e18af877f9
SHA256ea892354d386a517b8bda1008761fa718d635ab3ff49ed938119b89cde061df8
SHA512e33238c416fdf838f8c824570f170a40290435afb149d2a3b26d8a5cbdbfbfe6a5596540d571ec115c7d66c8eb8468f44e6540e18b9a7e272606713bbf9b9050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef95a84adfdcf3fca399240adb4ce8c3
SHA1d0f02aaa9066f985438390111973361ac82a77a7
SHA256239272443a0a6f7136c65523f478eba25d88df757d3eb9625f7f6f99120be001
SHA512dd61dfd017c46eed711c4a145ef5bcdf41e3e54da1464e296ea50da76b61429cd5317f370371164d10132595abd0453a6e6ae7091a22ace45296493276b0ecb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7af7b1b6865ad2338a0550f12ba1de7
SHA19bbeeea2ea8ca7fca4cf692d433318eb0a700f42
SHA256625a1baaec069dc28b89576b656f357dcddea44b19868d2d04379906301a63f1
SHA5122df2f7ef83846d80b9d64110e512a14955804e319ec489c6a0913fd7a815aacda16c7e78d0db54ed93e5735dbed7b289732c94eec188aec4f766e6b7f1aed0a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6912eb4229368ec39cb8b150cccdea9
SHA1629e7e352302da90174a6646ace5c18f4412b8b4
SHA2561bb0bad881295142418342ee537b9ae534e4ef42a3d9d3015e65a9c1084ff986
SHA5129a4ffe2ea07a0f8c14fc5cd7feed41158c92619e6a45a2d5d29dd82f71c8c2d9e984403ba7daac46b22a06ab20663bb0dcb2105cae64bd061b3cccb9d6038dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5977002b29899dd8c91715a7ec4ab4a26
SHA1b38bc73bda49000164299e0653c09e0cd4d7a49a
SHA256bf4d801f426f349d1835ad448a726800269ea82cc3f1b05a3961d388d2b593c7
SHA512f7a36bb9a4d5bf5ea9198013dac99eb700ec991480f9c5712843c2ab31406c7391d566209b8f713820224082a9c0bb5ad5b1d0e459d469efd4777cab383cbfc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bddaee2ba79c5a39d58808a9cde4892
SHA13c60fde41d7a8b5164f9acdb6556224b59c39992
SHA2566fc9320e10d2b0d4e4cb371b798fbf50d3319a3156288bf757f17e755b3dc556
SHA512940866a1d005fed8105206f6a910db09de10d729816abe11287a56f843a7f240f633a6203ecad12a076e0095c4052f1ed8af70fec0ad23e00ceea025021227d3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b