Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
ef91bb4d4c303231315e37228412e8a7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef91bb4d4c303231315e37228412e8a7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef91bb4d4c303231315e37228412e8a7_JaffaCakes118.html
-
Size
139KB
-
MD5
ef91bb4d4c303231315e37228412e8a7
-
SHA1
b9139a30064ca97a28e7d18aad07d2de36b1ae79
-
SHA256
6490271b1ce019e24f86bd82df6b5b39a7702dbea56fd9a3f2cf42804f131990
-
SHA512
be42a77d94003d04550d44a7b37bf7b059fc404c156209a660605156868a6abba0ff5cf7c03a1e8dcbd5069a75f0162dc3f8bc5b8b9d6b0430154ff9a3f1d741
-
SSDEEP
1536:S4NS9N8KlzZQyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:S43byfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433075343" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D69EA3E1-7801-11EF-BFE2-7E918DD97D05} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000000102b2427c455cfdbc0c47e7e64e13c9006101faf56bb410d35e2b626fe2ee1b000000000e8000000002000020000000e7eec26eac7cc0d9d23319360fa0df2a8bc9a7c3055504ce3dc8c30555262ac2200000000f7730a9052ee0595f729051dc4e046aafeb909a8aef309ee13981b9cbe6651840000000641ebf2c9a7685a9ca27dcb3682885548637c14fe671ecf82293f1e1375acfb0d13e9da7996009159adbde20e1f3460e35fd37efa65b78a5b4263a70c53d3792 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9024fdec0e0cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2444 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2444 iexplore.exe 2444 iexplore.exe 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2876 2444 iexplore.exe 30 PID 2444 wrote to memory of 2876 2444 iexplore.exe 30 PID 2444 wrote to memory of 2876 2444 iexplore.exe 30 PID 2444 wrote to memory of 2876 2444 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef91bb4d4c303231315e37228412e8a7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2444 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5544cbb05f172c2e5f3a7770a9eb8a851
SHA1582e6313d53c887877c49088e5cb2159612c8afb
SHA2565cd2289f26e1ca52de4dc08452377b20bce02af7ab6fbf940cd70b90f3a8ad86
SHA51200af246943679676f9fd44b60378554151467c481a352c0f51ce4b23476c616ce1b72462afeff54fcfee7f5bcd401f87acec108219cb823b5e26720e99b831e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f151c8a16c5623b6e18d02c78a021399
SHA1580e1cd6b0b7b255a7ada76fa64e5fdbce4380e7
SHA256034910647a068fc76f8b554c2cf4caf09f5aa97e13e8b28c657d8a0f3339fa3f
SHA5121be0b70656996eaab7390e6eda98d9bd48979800b28a97d0c9cf92ce23d3f5304039cdd46664e56a65909ca55673b8bef58ff771816ba6d5ca10e5e66681b963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d52e5b1a1220a3460938d57371959ee6
SHA1249d688298be2d0b52671670ec402e2802a9834b
SHA256e4a863be9ee8c0e3fd002caac554ffa3c2640bbca7bac4a10fac3f0505e84469
SHA5125933751fa6275ea19993f5537c1f4ae71345cefd9b75d653ed3ea3b42ae21459c8569f191b751336b246d702807a7e38eb7f2c2b61fea720d13bd5667571fe25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567e20630ea013f952b883aa9681d25f0
SHA1503d0876c53d014177050f74c7bd5d6dff98b0cb
SHA2569960e95e1834b02493214a576d9667accfcecd75e4dd3afc7b270af24400e374
SHA5123dddeea3b2edce9f983da6b3c458c0088c09f027dae6ee882c62daf0d80a1eb3f407328c3a20270c6857df295003f171fdc208d5e343f504bef39a0a98ab48ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fd069bdd9a5a487d1e7c2125ca21c63
SHA150e59018c1ad1c910d922383186fdd3d112a05d1
SHA25631767519e33974f24eff09a37cff6e6b9de8693de614aca3ab6f66bf7256f3e1
SHA5123af2e41cd53657563c8b4c2057a7a5024adfc7c333f73ac69396ff6e75d88b19c623af6a46be0f8f98358caad8aaa373d8f1b8f2b4c9a1e76dbd1f2cad61081c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f4c40842bf1eba3c620f4a56dbc421e
SHA164747c23f461b782b10c448f2038168defdf9123
SHA256fbf8cb583e4bb4e0e95db9f15cc02e8c917bb37767b768356414501cf50a367f
SHA51283689ea7d9f85cb72a644639ddfa38761c05a433dc8b991b08514639dc0ea998defe9c52558c828f6f3ae4b87135d5a261a443828f7a2f7f9e8d0a8f92d170fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50003a97506a2b24a454ace95f9ad9a17
SHA1bf1d347183c9025c112dcc734cb85a30afd9eb4c
SHA2565e20a44797eb9cc1261515d25180c96410fde5198f968affcd6c569f357834a9
SHA512a75245a48b239fe8e46c3c5f1c69ad50a379e437251058eb1fc6c6677edf44ae8725e924cc67e03c215b586c7c47ee71a4be2c2c0af1be191364310db7cdfdb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f1825868dcb725524a7ec8166242203
SHA1808887415692aa076459fb9b149e8acf46c51fb8
SHA2567cc0ee285f4e4e3cefdaa9aaf9b10dcea2a3b182d415d3d1edfc67d09ad44191
SHA512a3ce12c15aaac8588013e05a648f856c0e73e9cb4536d5faaf731f39c688a20a4088028a37c08798f7495122d70941377f010cb422e66dabe4cc88bc40315818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed0534e57fed1bc4609fe68f3d327216
SHA1b8c89169a020a592686248c7c74e2e8029a81066
SHA25637db060a2e7b53a5bd93697369874649b26fbadd50200960ff73361875f2166e
SHA5127380ebc63dcbd9660973f6b9ce20154279e35ea2898f799a44a2e6b344ac1868c1cf814c2a1db6927f80e82045a411bba0ee68d6bc2a7dc425f86962d4397bf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533c14f469c162b0433adbba3b5e25159
SHA1f06c20bcd22d393fe58648cb064bd558a3f1264a
SHA2568a38a1f7e3444665036ea0e808a213b888a5b33ac102cbd36a29cc7589faf219
SHA512789e77216da696465cd9f6ceebafff4004a6c29e589164ed0b765b35c0a3a41e6c1e18b76b2fcdc00e1cf5b8b84194415216178cd9ce776bdbba040282de8a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507d2f6c5e0d73a46cdbf99db33438a34
SHA19289e994ca3398a7060496c6a384551af0635a91
SHA256620bfebff0d3c3f2552d64af40b7931aa74c28024811893c0bc3c29ce4b79212
SHA512c615ab9a3b2b49eda06c6eb0da62744c73cde41fc7a7f1cc211aa47176b2ff151f42b244d79e2b53266c02ae9a4b8304101963fa9505d872337c2945710ce4e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54479eb70cc1857bd45f1dbf6293ca14e
SHA14c377dcc0af09c1c0bd36ef841f9c99d9530a636
SHA256612b2e70ed3b383c0c2d7617720b3c966c3fff4fb33af8ed7c40bbb1fd316193
SHA5126464be7cf43d5b3b78b512252ff81dbe2e0e0e28d79f0196443cc235440034c78af6428acd8c44e093c0025ac12b6f24820f28d8a95a7c34272a58abc446748b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a9c7bc44d58b7d1f4c18d831ed1f075
SHA15865e53e8b2947a75c2345684ffb3fb63dd493e3
SHA256b8c2dfaf6189c3c140fb928982f402e52f42437b976f1e8a394d8439a44dd8c4
SHA512c1fdeabb48b2fded4e2a3f8e3a10124fd2220ce532e975574333f4bca9979a69dd29c2284314cf8f38d59846884eeffb773c058d246fc3c2884a35f7d53a502d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff923cbaf8c42182e24ffa8f4772d135
SHA12c83477708437f5f97111c147279a17916cf58d0
SHA256f1d89f3d4308b2204717c5c567d0e89f945806870f0094805b27f8b06418b935
SHA51281fe0e00d3d1451075a64bdc82807d84e95932ec730c843b5e7c366ea4d2d647e22f2d03cd412827e57031bfb257e21878dbb227026cdd9cdf3bc6c9f10104a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5536cbc61fa5f064c4607c8cbf83bc768
SHA1e2e85591297ed8ca7b46ee4b10158bd02b062cab
SHA256d0fba09e3c28f62b95c49a284805facf6b868bad11cc2e4905aef307028fca14
SHA512be34e5742377549443606e4190a9b73280441f99b6ef83fd46efcd6943a3eea0a5c620ea83b051da07faacc6b9c18dfe5e007bf53758009a2745f781042de6c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53981b925ac6c981afe0bd6f37841ed70
SHA10e0c58ccf2463a793092579faada7b77a41cbddc
SHA256147d18a50296627fc839d4eedcb1da5b6f3903f92f24e1088179bda068830c14
SHA512857d38edae67759246fed896e35428664eb39d280688c00885c792c47932a6701c4b6bae6c5664e0bed2e4ad694a612bf2784b99a4cbc5f8963abf2919250bf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58918095850fc509bbb5bd9dcb305f296
SHA14fc4c7608f897ce3d9b1246cc6b751f550f514ec
SHA256c6f7bc9948ba199837f228566029c5150d5f6880b49511240a5f3cc87b8e50fb
SHA512f678f08542086c2c1cb820db10e54571ef5bb43fb29bddf438b2227b99d9b6dc632b94c4ad9a41d71f74862207679ff25d1f6f24a6f8162863d4f7fd61fa3245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed803d0e58316f15144f1d84b703c7a1
SHA1212aaf0400b77b7936d23f35f1e181639961ba09
SHA2568a4b267e12ab67b1bc6d6ffea3d82a4f72fee0e643085ac9e68fc0829127f824
SHA5126704edfeadf5b20736c87b8c88878701d5418a86179aa5304dc2f69f3852536a4aa7d387d284e83e36401bb71f599eed54698f195e02613da50fb53fa63f6c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a942cd02d41eec85101da3ccc76d65a
SHA1394c827abcb3f245a2e094bc323c74f919308357
SHA2562cd4670733dbb1c3847ff514288dfa8b6820fc9282413281e9dfe00b2216a96c
SHA512841eae6fc47a3260991706803ae16d7327057fcb9859d78bc4a7d281a792479c58775991075158a17ddd35c01134077ad9ec5e396618fd24a1a010eb49098fef
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b