Analysis
-
max time kernel
139s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
e9f89d5d02d92a54a0a126d802e995b4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9f89d5d02d92a54a0a126d802e995b4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9f89d5d02d92a54a0a126d802e995b4_JaffaCakes118.html
-
Size
157KB
-
MD5
e9f89d5d02d92a54a0a126d802e995b4
-
SHA1
3c5df82d677d1ee4d7d20ee01709d0087446247e
-
SHA256
0b7d3f64ce3ce796bd141ecbe7462ddedd0653c0ea549de906a9c729eaf2d41b
-
SHA512
013fb46cc18bbac255261c92ad895f2dc8d06ed5cc974b031369c3197a225c05b2eed2d80557858370ae61cf235b5c255314cb0c20aed23232f7af73ec47011e
-
SSDEEP
3072:SVk8NHVCePoSyfkMY+BES09JXAnyrZalI+YQ:SV/xVBoXsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D03F02D1-7601-11EF-A6F8-EAF933E40231} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000a8050dafa61367c09d102287bfcf484f7a000899ad099d5dadc7261cd01cd203000000000e80000000020000200000000b53a7c7845ad35f8a2571373d3bf099c04784ed2f04084e81d2aad7189d6d62200000006be8c1fc28d4971df847f2c32fbf7e2e0ab2490cf94f1e8ee61ccbd8890ae0f9400000001577e05c80485ca9ad511f6f8e4d58ac467e3c7898c49a1ff0f8bdb70e14012f08ed866263baf22e5511d8dab431eccb6aa985b865582b30450378dd7551913e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10165ee50e0adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432855430" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1544 2012 iexplore.exe 31 PID 2012 wrote to memory of 1544 2012 iexplore.exe 31 PID 2012 wrote to memory of 1544 2012 iexplore.exe 31 PID 2012 wrote to memory of 1544 2012 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9f89d5d02d92a54a0a126d802e995b4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2b11997582382cedc3b822678b002c7
SHA18527ee631660bab932bd74dfcd0e9e068d4c9147
SHA256af67c1b6d98531332e73e20cfc8f74fab790a57d50aea0d6f3654073148f77ce
SHA5128c37b37904f3cbf83e6dd7e14245c0ae38aba526629237336ebe9e9a7a98a9e741a7fa62cb99fece3aadf890db88ae6a02bdca871d77612ea0ec0b838e1a3d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f868c87beb6df25a78a5476a56ab8d5f
SHA1f3956ae37463ee1d13cef5a7ef35d4cec11ff31e
SHA25697b3029dc16ca6613e8abeddeea5ccb0e8c5f69ed8238b2acefdcd814603a26a
SHA512049822d608909afe34e9899c23f2cacf539a152894c2a072a275c65c7ce1850384dd276f3088c5ae8001a9a06afeb6cb63ca5f119f163ea7196b8357230dc1bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d99ae53ea6257ecd4fc5e4cd423ad76
SHA13e201c8169f0c9b487e6fc715945dc208a98f908
SHA256313bd555da1d0052158df6c7078bcd41ac88cf18a87f51bc0548b304260c2120
SHA51297a4ebbfa9846822c1053d9564995dc936d02f2bcd49189f18399e723e1f8e827ee944fbd8a12777d158d8df828a2d8c4c36ac0c7f8960dee2ba4ecf05834382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e39a07ff1868b06f4e20a596b26a3641
SHA198ddf065cd7c5025f9501ef624e12a0d5f086f0b
SHA2562b995096e29b09273cb87d2735ad8207d98ec58b22cd4c42c5c1c2d36daf7b3c
SHA512e6a66b58848b6e6ff5e0556d9e24168fead69682b6314b131bb322bd0d6ce1e17790dbfa768347d9735bca095ed140eb433b09e97ba5e95c562d0ae07a272ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f819046c0b8e17d96269a93f49a70f3
SHA18c8ba676319107eaaf804ae6e1bdf01cfa684194
SHA2561ade9f85136d1e88000b67d204eaa50da478ac8747ce4ffffc277d9dd6b94ecd
SHA512d1514a9b4499f2c5533bcafea4609448d77f5904fac28211d8e68978b0d3d529812d62480fa0f2ce4300efbeffe57d5ce05068f8c0d1bb1af68746acf554e196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590635b9a3c96177ca864b570896118f1
SHA1df399ab668b2d6af6700bea97e2ed6af13da9e86
SHA256e77ae54ec4f8183458ec4fd689c615eaf48d354b7fa320706b24ae75c43e51f2
SHA512c7283e40a9b6fd8789c220a7d08a780c08ec8d88210615c08ee494cd6d9bb6b161c05af33312935e91739630734e9b1d1378e6e1061b177bbb2c3405344661b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5141983159a0835223c443e00f42f0922
SHA1e1175ee4da86e0d68577ecdb622fe95b6b3f06b3
SHA25609123729b53e6b5164401e1e66038d6aa8b413422a46abfaf70aa5ef8cf733ee
SHA51206521758693e57826853a26f4586d7a4925a832c093c070812efea3ac21d3a6ce8f5a2438822eb1b96c72aa281194c578191e6f96a78decf56f9426b7227df24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d10ad887916c7946e984809fe5afde4
SHA109f72a435dff762f624f853fc1be26bb2f60dfe7
SHA256619aef0d978ade17e01c7bc571bb6d870dda8e31fcc0c8c0187e509703c11a96
SHA512fd587715996858bdb75c619cfed902f910d4e8847470dae8aefb9440925f4f1190badbaa1c3488864c37d8aa9acea4b9a6720eb79b1e36a825d8a45c908ef47e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab5b1fd8fb8c2ee0d193c8c44b6d983b
SHA15adc85059fe7f7ca4fc7c72745338b51e6ce4dfc
SHA2564c9287e5397c986bfa91c9c1053b13773bd595e2e6e20f4b9408b940795159f9
SHA5121af5bd4418488864e1f1d4b5293a140b6b4be00bc5346563a462b88c690da306c330bb4e491ec029e290032fb0f857c0ddb8bdb676ca1f1c9d34e1ccf11e551e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9810f35e2c7dc4af3286b5887dd50f4
SHA1fc8d91768985e6c171df261e1df2cbd13ee10cc2
SHA256376fae034c1ff3e8c0a8cf18717ef3164109bba42b709b1fbc557696400e4b21
SHA5126a2e5e2e1696a3c5f120a9a0d214dbec53e567382638e9cd7fcbdcea3fe178fe1eef985e0485474d468b9693bc3d26eca69545a17bb05b908ad51a7c3d3e5d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab5ae2e19b37c553b4dff4958683ddfa
SHA12e1dda0591f437ac0a79545f81134b7d92e2edcc
SHA2569a0d8c9c40fbaa7db6917f4af1f71660cead691078b3f9779d423f1147b3566b
SHA51206a93a85c3119d783247670a5b7df08dea98a4b5a5edddd08cdf5ef7d4c63028772dce99010ec10bcc38cfb15d91559f4895f008d7025180587e73d9b7d0c5a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bbdc697ca8d8f3e85fafa7d0dcfafdc
SHA12e2a6f41846962fcd0c6a75c86fe4445422e6d70
SHA256e132302765d908c237cbfc2d492a7e24d56f62fdad0cac6556a17e0e227a0719
SHA5127e9a7a203a6dc0f827543a5e32f143c61f03d03a448a31947f7c9a58ea359bb085bac4a6284795b9ed3980df00544fdc2e38a470de703818a9e02b6b1623e6fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afa66bde773f423d72612470b768911d
SHA1003e811cf9a8680eb6a672b4e6c924ed44f0d431
SHA256404040345aed099cb44fcffb24d28987af1d131b581dd995076606c04acd2396
SHA512218e2202ddab274647173dbfcfa98714b9821a4ae3e0233a2dc1e477e106f60285ebb3ffad676e9be4db5432093792f4674da586be5fcfd8715dda13594b2994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a26e5dadf029aa11eb294ae97c410340
SHA151928fa8b78396029b6c75cb2f92cb0a51605e86
SHA256e30ceb32a12e7cf3a60a2f574eebef5af1932e56200fcc65ff58570acded4860
SHA51289307fdc51a664873de53013deb90a17f80c1770257473cb2506edbf4b2a3a83dd8a119c90184072792f1952aba2edb1519f5036f865010d7e2d9549773a69be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db62f6bad21d84b0c3ee7a6aece50b1b
SHA1d4896ed61968dbc33800f0c5f4c9fb106479b188
SHA2566f98e86d31d4d4df28d19bb0d6a5aabc31914cb736d31d147c1003ed22415ebe
SHA5128eea7133e19a72ea26be02443dcbb26b8353995926e899cbeead6604627c154955a997100877f3fb121e86cf106f1df93f590fabecc8e9f7b6dba268c6dbb5ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b80b0ec44f66c9db2c44c550e372889c
SHA1db3bca43ba10dd535c7c320d9dffea145a1ccf08
SHA25626e55640688f9e48287f0903d671a5b907dde34dbc94514751427314dff31165
SHA5129e5b49f411ff5a849f195ae37c0a8f9bdf631962d318bd61411a06fc64b448caea210d9ded99294d484345c9184159b592642e68ed52258c85d5f05ef4d1e617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd39cd583938a37a1bec1bab73141f00
SHA14f9bc1fb9593e526c77ce1eb74f538fb8a78dc9d
SHA2569e9105c8d9b259918a72e8ea4a7d1a20911549b94873bbe22690064078040c6a
SHA5124cbf793497c88fefaee3f4a6799e435f7a2c737518e152a00b5c184def49ceaa60547fe76be397bc47542119273e4d4f4a01130c2f04de2b8416ec1b404fa69a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b563543d5ef70f5bd900448ffb64ad0
SHA19a47ae058d01c8bb4b8a93a18e630ba5818edb78
SHA25609ea367690f86c61443ccdbc32854f03fa2553e30d989927937db69734044ca1
SHA512d99bf9c8e22d742da2317f59abbc94c1b63e304caa0a1051196124855a22b2aeabe7de153a561cb403b173c7c33c7f056b396b2bbc9d24d34c0f036e2c921bc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561557db78acac7385b8fa6859fa9d2d2
SHA16d92a8a542973b1fe9db7e5ee8ec0f6ff1f9735b
SHA2565d5b40f805eebce208730e7365ad911e3539f30ff1fa78bfcbcd8f1b4e10c832
SHA5126cc1e0d20de30784e34b71800d660c2121f82927a3c4da6439405eb0559b499635634d1ec97960408247ebc4ea68c603e801bb587e6356f87679aa1a30b87cec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b