Analysis
-
max time kernel
74s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
e9dcd6d83acb79591c1e333b613a8ccf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9dcd6d83acb79591c1e333b613a8ccf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9dcd6d83acb79591c1e333b613a8ccf_JaffaCakes118.html
-
Size
117KB
-
MD5
e9dcd6d83acb79591c1e333b613a8ccf
-
SHA1
94fe889c7ef7524dd353d0b10c7564575d2c3a80
-
SHA256
b663ba9aa0c1a03dcc979bf758f66475d2fa97ece885db261297c772fe3c89dd
-
SHA512
247bed8dc5b902b1f225d8b5deb3237280041e797afa4408944d2257be70a2c78fa5880bf99f9185cf77d6eaf9067dc4f7b5d7d26312af08bd7050ad38cd33a8
-
SSDEEP
1536:SuYp75P1yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy+:SLpFdyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432850937" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59AFDC21-75F7-11EF-9B59-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 808a4448040adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000e2c29c25621a9137d57854a193ceabd7fcb352ce8da7e0998967da744b3a5590000000000e8000000002000020000000fab0230d4e1d71c5ff77067841dada3c893162752d53a7d1f8712251732b826e20000000a1d8ac2f8927b651175b5ad85431c621408a45700fb900d1eb297aa4f8632e8440000000b3740a1f79694fd6df4544a5b132c85b2930c65c0f2d091efb0f6b17bfed02ba846b07998d527d31d5373fde028702280ba73d18c6c094ebb09b16f3b746754f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2436 iexplore.exe 2436 iexplore.exe 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 1324 2436 iexplore.exe 29 PID 2436 wrote to memory of 1324 2436 iexplore.exe 29 PID 2436 wrote to memory of 1324 2436 iexplore.exe 29 PID 2436 wrote to memory of 1324 2436 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9dcd6d83acb79591c1e333b613a8ccf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569fcef95ca6d28161fcc7054e9225c9d
SHA1d98360787ca292e14a99111333c9587f6698e812
SHA2560971f1d96899cf0ca7bfe0af709d0edcb4fa5b3101d638f3cc14f62048ffbe31
SHA5126d9ea0f5397e7c2fc7baf4fe0949319e96a7d552448b0b8af59310f1bc31753af9aee615441373115704cca6becb1c38b7cc97cc59ac8c4009973e9760036f19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585ea0a31534041856b084dce3f61e456
SHA1d874d1810166a5af029a40b712cd967b301506d1
SHA256e835382d68171b0568989e40040a374e1fe0e09a61b8216acfe86aec75330894
SHA512ca6e24ee91157e9df5357a4890685d16e09498efbfb665e763a4f957296a0581bb6acc1b5d90c10de1875bf50c628651d52cbe319ca3414cd6d5c0e9b714cdd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ac4a97ece8813ed1b30fe62683586ed
SHA1f6ebc3c278950d9385ea8579409f5393d3c49093
SHA256089a9790cd81e10fb0cd61309a3126d5dca3885d6a43ee4f654b71cdd39f5038
SHA5127ae344616da1292613aba249231c73c734f010268b5beed87739008a4539c104ee49e1962881a6922d46a47443800520aa701f214307e02c490e9a11c6473014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57952acd763b7b4223b7fb73a3370395a
SHA176f15d611a719a7df51100ad2336cf62923ceef2
SHA2562f18f88464bf40159c85d2bbb2abee293438c74a840cd3b007b56495baab8cb6
SHA5128052d7d1ea5e3668350301418427ce631d6f045ce9c606776d8974546f2dc185e9ef1d50d29b83a69e9400feb3540aa66ed18cbc7bfdcc959bcd2d62f94ff56f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57923a16f98ff89b757890170a2fb50c0
SHA153dc34607ca851346921570d0b77d1c84807a3e1
SHA25650a9164c112996f92140ab208782c1b695d6ea7410a367d536c91b553e3e133e
SHA5122a869010d0c841917dc245e2320dd7d2738bc18c5595830f09845ddb30a909a8331e8bcb3b3d68c5110566c3ba0752c5839c6ae8ebb77b295f75165cb3791626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdc2b01efccf680e727f236d803cc0e7
SHA17dc8a837a722b0f3cf7212826027fc86ddfda4ad
SHA25601d4aeedd8da6d20f2780d4a8b5ed0e8c4b6933f0446dfa95d4fa8a29612ad4b
SHA51274a9567074dbac8624e5b453d60796f74d71c72b6ddfd1086f76272f1d6ad2fdee21c64d6c9cad9695a8ae0a9960973a645d4eee1ae4ed71856944012df0b878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed9db83ea2405a2c48a36657f95d0d8a
SHA18414b6a4da249eeba9ad5adde2329de05c9ed485
SHA256dafbb6e1fe58b9b6b52c3425c54478b7a65a3c9f9c071dac6c4468e4e0fee022
SHA512e980ec16c3eeb50b8756dfd8677ca7470d2959292b6d923afe40423ee3cfd8f1a742a9c7212edcea6889234ed1d3acd86bfbd511eb994eca05188865e0d9e6bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad9fe44adba57d5abc9042e66659c480
SHA174b759836b7fcda39caeaadda691406d0fdda80f
SHA256e0f39744cc7bba682614b056d771f311f631c788b39ea2737a16e845ed300907
SHA512cc1786bc6d7bf971e3b400fe41b983d53ee80c41e0924bae83d78dea1abe722ba3a488550c536cd30cf7ce7d6c67b80e01169fe9ab45065e07c2f9774d721054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c09a3b2fd07cb3ccb3f011204201a64
SHA11cf6ddba6b83c0173e098eaa07bef02f1cba9474
SHA256c9dfaef4b71c74e7b73f5c2964e8aae15dd327394a9838b8c9d725dbc63b8f87
SHA51261136dde7e52323773b67bbf160fec316948d6f4ab1aa0f7c6932cc72ed3519d2abb2455e06964ca2acf0d8c1344d598f9b216f35dffe7a8957f07211910f82f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6e4e1c65492c21cb2cc4379b260cb2d
SHA169cac9d79f45eaffdf06bbc4eab4eec99ee5efec
SHA2566c5acebaa71eb6b2049ef4df2330e90e34b6c907e81727054924089b25b386c9
SHA512f64f59f31e28e66105d00a84b6ea429582a8d6af0dd28769149b58459af5d8d174ca66e699ee8d8e490ffdf3b2b5f94d4888cf36d5f9b434627ea1cf93f6c310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfb6bc2d1f328811dfe68fb466846784
SHA1a33d45b2b3b70e6119c8be890547850802087ced
SHA25671fb82860713fad795d24b1ebf210104951b2089bf530dd772b7830a08a5282d
SHA512d796081e790d64b9df96f61b48ff36e376997dd34c265c1df91cf69854c51175f12c308afcaaf62a2913cc20d3222befb65ff911594e2f2b0cabbd8fa6740273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532267e322d64ab185f54f3edb590bf0e
SHA17dcffb867882b219ef0bc50857e48617546b5112
SHA256f5d4ad75aa5820bc77a2ec481e51e689d3267715e7ab18c6ebbe8626790d3a96
SHA512cfe957bb0370277fa9b351873ae4bbdcb30c65e4ac1a2d9be0cb42e3116d2d1ac2195c938341843f1eeb4438cda7dc500d499c6c56e71f0947d6b6ebc9f1a522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535529c8a4725182f49e056d17966018c
SHA1211762431a2ca52b3a89f847eecfeba0aabce5db
SHA256d42584bbe9d6bdbea564b9c4a7b05586964a2697825c852cde89242bee275cad
SHA5122544ddeb8c70de7e1d16de67f3bc01d9f6cb8f1c6170a0e06ab71143a8aa45ab78b2014353450481d7576dac669c841ef2a9faaff8740e92bbe245ae576a9e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fa0118899d409d9157a2a92c08ff35e
SHA123908510d6b5e0c86297bba2aebd29ca57fb0761
SHA256edc038043918e163ac9349fbe634eec5298c722b220f05f87578818563aa1b9f
SHA51211ecdfc0ce73e4c1dc6081697ff7a3a286de7eba5eb06cd0f89ce9c26a882b5f98785cff27eae39ad0be91b10f4acd1796e594e0a31e86b75e36fd3555982193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec043fa645661df6a06ae9c85faf3971
SHA1f7b1ae63b1236571eb20213896c266f154e02391
SHA256bb9122ebd45cac15fb40ee3bff09e56ea52d81f2cdbaece0f5a04949da6dd352
SHA512aa11aa924b6a7b79bb9d36dda9ae151489d6518124a0458e4b01c8d86f4fc122fb193bb818daf60079662cfb53f444e85b5c338396d0403acca94a8b3af16122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5546f83a4031b902649c737402bd34669
SHA1ac0f7fc7fe1c447c831da82d63dc5f042ed4ef2f
SHA256c723560c36aed2b7bf1c948fe9ff7db521a70f312fe19aa4f36068cf721593e1
SHA51289527cac973a314d3c1b3f46e6896a44dd450d021d7eecc84d62b1faf0898d664f15573db368e2eeba20e23426fcfb799f2417857ce3572b59330efaa4c49a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f02f7c7d65b0e74ea2554abece426df8
SHA165655e1a95b5790f47df106cf471cb104f94dee4
SHA256273913d6d9135da8141c4fed4b1d7374301fea35f81235e12c73b74d3721ce7f
SHA51240855c9e77e835bd76b08dfd68724d4ec66676ea2d8f2ab14c970cfc4417b97c25faf7f84fc1896d804bfdf76d15a3395d2f416a7c707156fd935b7359a9cefe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ab04fa01e75b674c7b575499137770e
SHA112b8345c9bd7743635350ba46359229399e495d5
SHA256ce9c1c91f236631e1427bc104efed53034df0fe68131a2a525493fd2b1564a80
SHA5128f9f72b79db259d3515f32fb621f4bcd2faae839dea44521b6b492edc1081137a164c9ee7f46ecde37f20a7c2c5cb634cf916e715daa2e8e73e1d0218fea4ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d2f2ab92d544f1b2eabaecb8aac5ac5
SHA1589a2043878bcdd844e03c6882f2891dd6df9695
SHA256867ed362a310e20a4203f09ce424e4794871e50bacd44ebf02f0cb8d2ba93401
SHA5123f37ecad4a3c335ce78e987a3c716f3eab759fe41ee6ea528ea9f3080371bc22860710da6239761bb44f7b2630c3a1c52af49a101cf8bf8db7e5b08ed5e6ab24
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b