Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 18:06
Static task
static1
Behavioral task
behavioral1
Sample
ebe857299ac3f4bb9a54fc28183f5d68_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ebe857299ac3f4bb9a54fc28183f5d68_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ebe857299ac3f4bb9a54fc28183f5d68_JaffaCakes118.html
-
Size
461KB
-
MD5
ebe857299ac3f4bb9a54fc28183f5d68
-
SHA1
bb9fc2ad2537d1f125f778727be32e727a47639c
-
SHA256
40fcc5d9f29d25af39ad7e9c4df59136592e29b60e5a791ebfb18bb155f0517a
-
SHA512
189256bd7593bb74d780977438bd0fba39a6a6b0f327c55607c981869c6a11bf255556307578b4c04478dcc89fafdb9d0f77cb1aee94079b59425b553a98ccce
-
SSDEEP
6144:SAsMYod+X3oI+YscnsMYod+X3oI+YMnsMYod+X3oI+YLsMYod+X3oI+YQ:75d+X315d+X3o5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000067a27950e5949cd22afbfd2f463bacaac2f02319b138629c714fe22ac7e978e2000000000e8000000002000020000000df3844c363fc396e0181eabfda4d2f4dab9135c33ee1d102aceb7236a41a53da900000000da8017e74374da80867977f8e7bb320c117e988812a680b0cf27caa3e8b6aa9ee4808070468fae0073b979fe8cbe19044973cf62a9f876c6355c134d18db0b7132dce5f33c61b1f102ff803070e1cef71148f6a0d68fe08e207de8a798dc7b4fc4ddd2e5c9932135932607e2fd364b61f85052b9f8d89ced3455b4f6519f0cd333ad2c1b5d073444422b85bf9e0030240000000cad787cec306a3627178645bac9bec0f36d3034d2fbb096132f31c4be11283df91280596676b8ca5685bf6c23f6e5d5457b7a7668c71132e3b94713afbf345f8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432931079" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F1F9FD21-76B1-11EF-9CB4-D238DC34531D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e06515ccbe0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000e3f2511748e6cfb4de8806e6f87155738c3d5e48d95f4e481c172c94b780c172000000000e8000000002000020000000353605252fe9b8d84d82ac89d3dd67faad967b406646424426159bfd812b9755200000004c839ed21a26d5d9924fdfc255586ea03e03c49ff7a5ecc4105c327838f9864140000000bd944049d5d17a8f838400ccfc34415830f1f24ee6ec3b89e16603a1fe216339786d3fad60c8a6fbfab276b71323db48fb877d4cd6ff9235ce368be22beaa105 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1928 2360 iexplore.exe 31 PID 2360 wrote to memory of 1928 2360 iexplore.exe 31 PID 2360 wrote to memory of 1928 2360 iexplore.exe 31 PID 2360 wrote to memory of 1928 2360 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ebe857299ac3f4bb9a54fc28183f5d68_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529f82ff7f58166b42ca1d3202448a5be
SHA1413627df4eb594a94b04b05e37152ac65e461c62
SHA25671494eb05ad5d2a60c174b35ce32ea23afc3f05050f00c59d106c1cac1a67770
SHA51230a2526273d625b1b1a79c271c283af5165f65a299163e46033516e8ef71920fce219d5a96c3dbdc5433716eead63ee296897ef1eb03980486619a713b3cfe61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feb5dcfc9555af0bb476cc6f59fc8d3e
SHA1a19f5369fcf947afba44d51b085b18aba6e69826
SHA2567545f164fbf84e723ad1f66dfae241077c3b5b63f3f4eb2fdaf7528ed6b05226
SHA512fac163ad328da9eab0a69a5e5e77bb6885a583aeb0e6753da05246cdfa482133cb0c4dd396f8fa1c23bd2aeb0d0e2d7b179917d667e4877908d930862ca0a3ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cb0e3af8b0295aaa0c5e76471d8c47c
SHA1fb3c153c655fb49fe7ca0a7ac660264705a72d76
SHA256a541864302879fbeb4f1523c9c7961f8db0f54765f8bb964afcb85852fef940d
SHA51258ba9bd250b79d762e98d90f83a82c12d7502bfc79c33e57770b063dcd1d2725381cb6e867febf12acd143887e8a9c37497703f013a966a9745e7ae5e519d0db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56caa233b5501d7fd05b16291adcaaa32
SHA17263c6609a9c06cba26aef44403e1ea950f80e91
SHA256682cb42df1329cfa8723d95205435876f12bf6904b97b6fd6e6004c26a17d733
SHA5127d763fd16c109f3d26a6a63a3263874356d6db6dc859c29a040a38a6c63e8779157fe2c4f3660e7e2eb256fc438ef927bf46c7f28cd041563da3c32f212cd6bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b807ad2cfb49467c834fd9fca6808f07
SHA144bfdd4b22435de67d4f7524f42fa751e09a0b59
SHA2564013bcda20cabe951c81a9abab77fb492c006e06f752b7f065a9d081e6636507
SHA5125ed1b1a742a0cb7c48198c61e3abbcca623639bc7697f8c82e6ceb08b109c1027a567c594c6316d4302e483ae77f6f793573ac53b5e186b29baab229edc3d8d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb8988dc8e82c471261c4a01d7252a26
SHA1c28742de98890ea7e769152919decba0595de2d6
SHA256220f7dc267d8d64d679fe25e1fd5f2471e2b11bebf19f47216e3352677add967
SHA5120cab36e6b9833a341c98033ec53b13a36d8259e72506d59e1a93f906a9a56647f7263e0235d73f4f431598e77ee548212bb4487cb92ead65d8db86380f65703a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecc990850d240a2421d7b01fe76746cb
SHA185da1d74ff4b8458e3576d2094305e5ac84623f8
SHA2569dd5d7b40326bf1118e8d3f97df3494de9327064a802835421366841af9fed9c
SHA512a0513bbb5a14ea68d4a48f277833973634196dfaa8c042a30edf5bb7da97c722c21b1d8bf6e1fbcd94175ba368e958cda2fa015011df606a33f229aba8092beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b3f21e7d78dc2b199090a9b64877bdd
SHA19021c76b076a7c74f2232e4cda9c40b28d03c3a5
SHA256ae7fe5aff79aeb55e36383e2ee25d1106125cc74b5a04f3960ac2bad2c1a1b27
SHA5122d298e57205bef701b5300f46eb338834a2fa6c99eac924bcc573bcf16bec67ce516fe360d428de1a7f7dd8c12a701f0138f45a46abf189eff5df9ed015f1d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eb70adb7a412b347d3925e02fff2d02
SHA1ed4f480e4b40324806e5b95890f156fde3788103
SHA256543ebeacc22fa28914a107df926818f0d5cdb081171acb94ac6c789c04f8205c
SHA51201a79df4efea9412013365781369b459b11a2fa66eed05edccd0010ee85073ef8791ae7c4e6e69d68facdb3c229ce526b8996c7d639ce96cc333e699b1be168d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a8499a4d5ac2313888cd8f7d4747443
SHA1abd10ab81ccfbd2413152a393a295e5ea79d3826
SHA2565dddef8f1b78c8f7d578a2858a83b78478cc7b69b40eebf447d15c56d6707487
SHA5122eba0a8e1f058c64403a1b7d70b509cdae751dc482321cf2240a878dcb4fc5ded3e633c0469036c06e5394c7dc597f447a956896d2417d380816ce0f481d56c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535fe6a3539f2c28d3ea9c4b181eccfe0
SHA1758761dcf2146389c757cc73aae66e2e6490e876
SHA256849110cce056c9d48478d7ddd61b46ead57b93071250d88d14d8bf331c6ac58e
SHA51240b81a6b21024bf03827f5716b891520aa363c0f26a4c62e1e75c33447f58e582c00b08bbd76c6bda1388b7bf7b0f1f13256b2c42ca5faee5a0a7fefcc5b9281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052a038cf55f56fc2c6b1cc57d30b40d
SHA130b330bd03d95de79f19bf61ef98d91473754891
SHA25673dcc3be7f381f21d945ba8e740c9f92806ce4efaaa1f6e9f80be18790c344fd
SHA512eb756a15d458d3ac8725fad30a95e9b57de11c7f970c03b6611139aee2b813f556ddec737cb508aa333068699876260daeb1d148e5ae92d4098393ae1be3a50b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dab0da0858608875318be10a1854a941
SHA1c583587199ac83abb030c0082f5ecd2ac5985934
SHA256015f2c0ea4fcbc4d3a48a1582c93992ffa9a01f88293d7a03c16d272ceec1742
SHA512393c88bdca1832df80e5b94718a82489d833127d2c6a26bee26a7187748477140e83ebd2489b58e30c1de960e308fe58e9b2b0835633d5d3e8039d09ae777a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57244db57a4f8915451191f057af90cda
SHA145d7eb72ea743df131492723aafe01c3b43b27a3
SHA256d64ecfe5f672e314f6fbc56b9856b96d32c3069e52bf6afd2a3e330d814dd582
SHA512ef53502eaa60dd06850a68fb7b1a585aedc2796476cf3fc7375bcd4533cdd1e2b973e084f2e6ff257cf503e1ef49e487855bd157097586287de43dc13d64d8f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee78fc4fb4d2227777510ff915afbdbe
SHA10f04b372516556461f833e16046135e1509bbe30
SHA2569d4819f2033ad4c1355af477963913ec49df5274e6c8ceb0b71a9a05fe4cc493
SHA512ce860144111a7a40d92e187dc1d34fecd0c9ba1ca2eeaf4047fc5444a6fb33d0564fab0bd39a3e844539f14a147f61bed76ea0346a6c3f8fa224f00adfc70e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561e5a20ae8af7f1e9f21ac1ee8093447
SHA128e6490973ff0984d22b139a8cebd969b11f54fd
SHA256d136ada2d3b035c238a5201e5a3f4b4d50af044f5cba46b723a0ef44deeb9308
SHA51250ff7bbd1de011e2840073d3dbc1be8a3c5a5964ff370f24ca7572ae124c654dbd37f4beafdefb1d6d90a1c7cfa8fff467f524aa1c30dc3c76c2ff26db02e07c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56376c3e57414badecf3c6acc873be912
SHA182c094c86e1ba45734f74e5c70a15b8fd7fd9c0e
SHA256fd3ba561a7faa90a2042a9f6d91672417bac399ddd95db8de5d6b772907b5501
SHA5123375db7ba67cd6609ba173757fe57867639c195ad47ba1784513ce8e1594c2d06ed1b41882a6532eae95fd69bafa192c75ba73a32a99607caae3a06f46873a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593e403a70b66b8eb8a7f3584cc46e19b
SHA1eadf9e355b9dd12d33fd2333df86fe74c1804418
SHA256cc84db276f841d55ce1102d7529b090df0fa98d9b0680e476c7e8a3cd63fe2fa
SHA51287f4e1692afbcab0b27463ff32546be4c4cfec1913480912738d4c5acd91e50e813019227e0d3d9eab085459832215d98c1d76bed4db86375b4879556a4dcb5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bea07a1b4a6ebee958d115355399f3b
SHA11f419e20edf3009c10c634b628f405bee947f7b4
SHA256766da7ac8f6d679704ea7cc16fef5482fcea29bc7782678182cbdf5de38c5fb3
SHA512014e6ccb642fba3c1aa7220395fbcd8e144d310e59eec5ffe9e7e46df38f5007957337032aa71971aca310806e0968ad57b15c0270f09ee80df353755f6cca95
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b