Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 13:27
Static task
static1
Behavioral task
behavioral1
Sample
de57e5c5e5593e37cfddd35f16d25d92_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
de57e5c5e5593e37cfddd35f16d25d92_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de57e5c5e5593e37cfddd35f16d25d92_JaffaCakes118.html
-
Size
33KB
-
MD5
de57e5c5e5593e37cfddd35f16d25d92
-
SHA1
948cbdbe9f670b10fcad443d1f5d2941e061aaf5
-
SHA256
a558eedd2e89aee238ee07d54b178158686758ae9ab9c79c488763770e41f835
-
SHA512
180342effd6d8b6ff5ea9114f6f2687fded955f9d1e0a7684f45f02652be9eceefaa08960a22ec9a2bb26c5eb2356c99a4229f574e26da033bc197de02eda85e
-
SSDEEP
192:uWXO3b5naZnQjxn5Q/pnQie8NnwnQOkEntTTnQTbnBnQeMCiAHkrb2nxvFtmeC+H:2Q/XgNgxvFwcVC4kFZUUMEKGq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE437E11-71D3-11EF-959A-C67E5DF5E49D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b5e8b2e005db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000009eb13ceee0e54f4d66db17ed3c9ce8a95b19565fb295f08338f1222dcee4c9d3000000000e800000000200002000000084f509a06c8c3983c8367ceb6f7bbe2a9858b8d47c297843b936e0ffeb5791c2200000008faeeedcacccb0750fa33701b44af3814587423ddb036afacc8bdb8e94a6775d40000000eb370791dc9c0dc5d210928b7f664334f774a476f326dd6e4ebc450e0ace0d631767f018d6a9881ba909ad0e490ef7cf87807aa75ed04c93323e753252acef65 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432395893" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1820 iexplore.exe 1820 iexplore.exe 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1820 wrote to memory of 1280 1820 iexplore.exe 28 PID 1820 wrote to memory of 1280 1820 iexplore.exe 28 PID 1820 wrote to memory of 1280 1820 iexplore.exe 28 PID 1820 wrote to memory of 1280 1820 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de57e5c5e5593e37cfddd35f16d25d92_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cd7b8b386bb75eadf95fb70a70f72aa
SHA1c701d83c7712b280abb7bf4c055f0532d73eee84
SHA256b49c70900c150c088f1d2d2c09d46e4cef569cd37d5110a3ea109916591a1871
SHA5128222a36f19bc63b3a31dbd92a3f99b4cf7592aec2838e614d182d10a4f5e0216c52a04e5b8c99acf32c64fa152e256d1c8f70f30d882de3f3db038ce46702271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f26b719b851ab26a565ca2ff29aa3a9f
SHA17ffbcffdd9131c35e819618c2bdda45632ebfaf7
SHA256a451050343a20b6a0d6d73a7e88f44a57607371d52138594306e1c66cd06dae5
SHA512742cbb1787f0f66fe07921f4b013c8ef22e197a207f9e637799951a4f4a83a94e249bf9cb200c6d0414a28deef7c86515ec8c1302aefa66473b6e528e11e9ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c342cee17f317f64b2458c1ea1feae
SHA153dab7cddabad3b6b7a9c04096a27c2077d09709
SHA256e9cd691169a01b2907268e6983508ee870e15637c69c2beb552e98f5131e0e36
SHA51245cc44754683b59db35185fba7000903da47b5d0ccbe68de7bce8cb8f5ab464207d5a8a4405ed6bb90b3ab7d5ead93d5992304e98ecbaf520b7eba5ccf3db0a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0b83226a6a82d9b213ddbc930070153
SHA17d46e6f5e7f7691d801e310562f61dfd15a9cb15
SHA256d1f091c2a7c9529196cd7abab147436fbbb3d715651b33c87c10fd972d8f1aa0
SHA5128e761490278210c90321d4f888e559c4a9ab1a0f583f0264743dffe533a0267978ebc415fd90aa96e3761af1da821c2ce3fce09b00df2573251183bee483a4d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5449b32a5605e1f5403727756e28498bc
SHA19b2135a533719ce06352f8215acb7b5c4625b9a7
SHA2563661ab5a9c852ccf7ec92bbe1a4c048eb816e80f737c4178aa6e2cd61df372ec
SHA5121a066ffeabff4bb729fd5cf1a8017eafdc86d44a2b9c2cbb1c16d325f47a2947ec6d91331173dadd1c4b982e031e0218b1dd62f938053d849468e3f253037e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e84fbe59765410073e0eea834c1c8e4b
SHA15140118a308e6913f2ca300e2c46e5019278090a
SHA2560e4b1c727ec128c0ea347cdbdfcde9e85d83158589ee29e79812b3d4ef34a432
SHA512a4e181dedeab38076abdaeeca301d71dca7d5c43278c3fc279b5103b4918e9581bb0cf1dee4d2421e2cbed463ee9d5883f9caa921429df9780231bcd2488bace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580861598032e5076b290d4157f1d1a58
SHA18507f74e88bbe01fbf14273f0d858b12d97e5a23
SHA256443f0c0639aa6c2f35f2e03a5ac941796911d17dc3f9d0587d0d873f7d69b0aa
SHA512d3ccb3c6334d285effb416a77c8e2f97abb5109352460e7f6e55c7c62979697cd83642bea8fc0a32403ff0f28467fe624b2c643dcdac7042ebe7485308c5cf2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0f79224d46935cc39e96b9c33f1ea91
SHA11eee8cad805ccdc71ecb6f5d3acc9f3d5a93888a
SHA256a1c1f4308434e2df115154470d206cfedbf3f0b35e8abbfdbaa6527838343cbf
SHA512fffe096605897a002eec449d778889df9e3fb3ecadb0cda8bd98c70b6831f0a8a635368fd1edb3681e78056a886fc807eda6f5029149140542486554f3b99cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510673873759d804e01cc38943bf37d95
SHA13089d0b000a7a512d9422731941278386177dfc1
SHA256bb239ee4b6de11cea869983fe663c7ceadbbddae7f825354f86d913bd7c20eef
SHA5127891a119349b1539d5a54ab44b0cb50e1615233e69fc7d6631a3dcf1a22c4f2edd78529e105106f23074f00328aed227e0c08f4cdbf8d7c902afd7f573fa2844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514af08e8d5a0447c2322105a417d9661
SHA11ebea8548e5fd66bf59c00c5dd3778bd40911e0e
SHA2566fba0678fb82f60a06d35175aab2de411dcb0653ace096926ecbec820a5d0353
SHA512aedffea5690ede5ec31d3f32eb2c74f76e4363a54bd7d71a8397a028daab63da21ec099f0ae911de66a2e8cd157bdda65be0080abd5f639b31e31b400296b049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57562bce58c1ea332582dae20e8ddd548
SHA1249c8c4bf5294c9eb589e8e879ae734be07bf168
SHA2567d8c6d3c28ec226fa136f5b98d365bfbb96ff7a5d0ff306870e674c60962e647
SHA512db3b6763616d3930feeb5e8c2b8a6b0b75479adac505824c03269a00c4be7030cd6459a7128733ae3e8f920468b36fe412133dc2c23c69e84065b8f4f3dbf6e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542b576fb14a015b68f65043f80a64900
SHA15d387fde44822144fdcc5e8723b2c8ea7d861280
SHA25676c602635f1be6e35f172f22df7fd1c87c540f65ffdf1f0e1328d0e5d144cdb0
SHA512e5cee729453dba91ae9f79092406d186d7566542de8c70e7a3e6c9dee0bdb1acad793919724a98194abc143f64826f30fb9294a23e1d8afbaa3af96dfde6100d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7da5b5c5720e068e214436e6ccd308b
SHA1cee1c83a613a431cc0d39a4065037c3aeb69df3e
SHA2567cf7a8c8576db34d95eb5e77c281dd613745a767e7dc0543ffea3d0926970908
SHA512404a4c1b163a864de114f5a01b9d6db9901e5d6b0f3fc7c349c1e2e0ce90f17fa8cfd86189888bcd2e427198ce987cde6a8e26555955f829b28a7f2ef287f3a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537d7295acf745c2e4e4d44f8d92889fa
SHA199247677b0e21bce86393bce0565986f300b30be
SHA25602a311d92a70fd55dac559bb533a1ee9a4b6195df38cdeb754248f4136e3eec9
SHA5128dcef791042206d4ee292136b59653630c0564ffdd23020781ac286fb19e75001e3d3f2a93a77fe4a281d009c6754583e60ab8838ed0668c8f6afb85c4835c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657d2fac4c6e6d00747c73c91bb51033
SHA1c94b4e66b1e4772ec1747316db35fba6d94107fb
SHA2563ee86fa0ed2cb266e9bf0f3138a29a64d4fce2d964b8850737ae38666fb591fa
SHA51246afeb3b8c8194bfd129a809b4bc13cbc99227c7b062874aeef89e8d6d292df3312042be0facca32013616f333d73bd4eb83166f4ea13d6cab62e5805fdd45e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ac8112de2548edb9872a7df068d185b
SHA14db78bfda93c6cfea69a8016158fdc720c088928
SHA2560a98210825167b3fe9c1da1e13790a08b35c887108b1309d8b3f999a4e8306fc
SHA5123c5641652ebdab658199cb772401a6c1360630305031ec02281f4b3cd1c93c0c13810d35bb0c4b6583d190ebe9705f8a2ab79b91c5d7bc3bdfc57b985b598787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c40bc8bfa7412dd54bc28efe55e9b86
SHA1467904e902b2f442dd3bb812c312fbb149e3bf6a
SHA2566fca478d65d9f3992517928d25bb238916774f597565ef34307480a13790279f
SHA512351827ac2d3a24e94e63c091aef8182d8ec4246814c07805dbfad1da6b3e2c134311b9ed72a63daada78c730aef02b9f216a543cb278070a7a04cb7a50f10eaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573775332a598fe80d9bd60e1e634f3a2
SHA1014db132556dac533c4044ab1046746785c8db24
SHA256836a4cb47c7ae36e828cc3e78414857c8979b16bcffe1af65796833a2a6dd790
SHA5121da17465522e075d3f1f05fc58fa3405465b681c3e4d75c56df21118cccddde848ff7795363d8f33de936094c03c3348eae91a4b89459b2935e5c7285678b2db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d3813b98a47115384bc590178dd878
SHA1710c1b602e0b5d7f5237b4189cf767d065583b94
SHA256ac0cdf4d26eaeca82b7d2ea8e8e0465c6bcfd33aedb3192ed5924b8426f3c29d
SHA512b95d5d741f4707e7dea0685e967652d7a698e73c9ed907dca594b15ed3f7893c84c3a3a899191059196ef4531f8d680afe2fdaa49cafaa309878fe94a60e3474
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b