Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
f71e2069abaf382b17c64a204f328967_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f71e2069abaf382b17c64a204f328967_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f71e2069abaf382b17c64a204f328967_JaffaCakes118.html
-
Size
23KB
-
MD5
f71e2069abaf382b17c64a204f328967
-
SHA1
ef7671aef37a5150cb27f636ae4af7cd7041e19f
-
SHA256
3e22c02fd788c27b90126bdb9b5d29e2e469e895c57b21656808acf734793009
-
SHA512
d9574661ec1631348cf2953f666457e8e1df68be108494c9253395a374589e35d03cfb4600d38f2498a2626e34ef84b5bf220bc7ca1491fbbfb90172c90edac6
-
SSDEEP
192:RQpUp6mY0BMCUl4iikLdaJBLhgN490bCE88nBm5nsAN01oLIqwaVgC5S0/IOeLJF:RiUBM1gkLULqELzVL5S0/9eLJF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433470639" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35637811-7B9A-11EF-96BC-7694D31B45CA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90449c0aa70fdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000008cf1b6ad6e4a186c74b056250fd5fccc972d58feefac54da53c0b3c330871055000000000e8000000002000020000000ee3d4ebc8464c5e1afb99516cc496b112fe2e3816b501706d0521c9fb44e61f190000000ff164744281894feea45babc55ab8abf16a0b190c48320737dca85142cf729800e5f8550e64d47727495d6c978578316137cce32116dabaf62257c7d94935836b4e2dba47f122e75868d4b656820e34376b12fe3f6c10ec41df31ff83a4d438d4ba2c7483abbc060411aeb5eb0fc213825259ec491c9f681cd1ea2f687e973ccd6d9aa33e7196ceb7e164587e0d124f140000000071e3eb65c36c2a0d2e70ebf60ff5fba853578f82408ca49c7bce7b29bd049bcf1d55646f461a2de6f8690e3ae45295868755bad7d5c748c33b065c4778d3d36 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000002c7f6cc19e2d7d4ec482099dc6dc65cb09e037906583e14d5a9f2d834cad4d55000000000e800000000200002000000040c718ef99057a95bf17fbd218c7cce5ee6ddf705666ff1e63fdce3eb1430dad200000006944143c2389abf53b50cd53cce346e7b6f75447c5e527ffe8b1b323bc864a40400000007e1f510dbffebbbc55cbe0d67515ecb6cb6e952ed119a344a3b80ae1b07e0adf32580797869c1cef0d6ae2fbbded2cbac1f145d34786a662717dd70f0d71c7e7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2816 2220 iexplore.exe 30 PID 2220 wrote to memory of 2816 2220 iexplore.exe 30 PID 2220 wrote to memory of 2816 2220 iexplore.exe 30 PID 2220 wrote to memory of 2816 2220 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f71e2069abaf382b17c64a204f328967_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5778bcb3c221bd1ebebee659395867cde
SHA13e32a0941965f580f4397209e9e254badcad4962
SHA256e09762d843aef2a3407d1e16a1fd76eedeb84b484917094d7ac8ecf55d162963
SHA5122a51b0bccdae894fc63e17c9577095c602a4d392ce6f65c78901fe2263f33c5865b3582018e1d525b728b74018bae865dc44790fa1dc36022b7bbf353d52a64a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5363bc29ffe77d697f02aa379ba63f1af
SHA1ace96ec9f51022a18fdb18542d6a9d3b7cfec489
SHA2568a4be251bd47612ca91cf75b7f396aec28ba94c1244049957b9a30ec9b843325
SHA512d6fa759956cc5a6339607c13b98e9d2adcf336010a09e2b1dc98dc34a6d7fe61d1e178498322afc43d6ff59ae4c933da1a449ff867ca8e51d0a28fc0415c4d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecfe243067e7f3eef0eb8ac81d54b200
SHA1261dbee9caaaaa587ec734d42a42b5298e5c7000
SHA2564fc531b5241eefcdc3e705de3d12c6657395d53c3692e4de5fce0feb09719066
SHA512887c47c835c4b56e1734491087e82e5833ce8e6a0a882a82443a0a8fb27263cc5d578079ed4a6cf55a3d03302f2cf331cfe86300ea0d3c213b1c68689d862d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e7762815030bd4d6c51e04993609829
SHA1815b2ee50bd9112448435e1ad68e8f18a8c845a4
SHA256bdcd93be682357f03d588c5ab2bd23f42de853500a1379baac003e05b48a007a
SHA5123a656c98e59c2abceef8e486bc93a5b6cf2e549bd3e9dab4f29ad97e76faf9378722fdb09bc2e69aa371b94273c0b8eac710a6d2b90ac74b64cfd29634b812fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b1a982a0fcd14fb6970880454924f7
SHA1680297216f4234a04c7f17114455261829da2d63
SHA2569c8b838aa9c252dc89fa9707b672245d0e2d92cdbeabaa40b68d4e90258dee3d
SHA512490b89ba846ea99ab7f9c6952d8f170854f8ab3ed28957c1f97b10b05579462841c41cdfe815c47b90247216e6bb5330e6d38ba5310757a9900d1ca4f927b3a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500006eb7e86cfcf5551e740228600b53
SHA139c27d39e7fe3c1bb6864796e768d6c1078e9449
SHA256d2338d5088029216e1fab22dbf67a0bcfe6cf0ae149bae1d27647957559b0883
SHA5120b58345bc8abade061284c8ee9fee0f256b64ea6ea3ddf2611be4f8b53d378011d9d6a443c9bb80153eedd2969848ed282e5462ed3f5edc44ff20fe1196c3e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0e4113a84ce83375157d772511e8e89
SHA1762dc93565f373690f1c8e9b1a3187dee7dfeb0c
SHA2564ad99cab353ce5f2c4147703e1b412e9f391f17d3272bbaa8c4be4043fd3accb
SHA51264c529f144e48b16c319e58650036c1488ed4916b8896e3f91034cce9d3862a7229da926d5fdc3c0d038b2503abd99fb335093d66d67ea5d33995947e6fa79d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e8f2cbfe59058a5ac64912dc2d21e15
SHA1ad159a99ee6580025a641f5039b3630eafac7137
SHA256585e560087a9822d56018bf5a22fd74b7d785b913c81ea76079487ca76f9ef5b
SHA51270e4ee3711eed77291a772bdab873b2dd0de93842fa4ac0c2b0f9d7360d4f521a44f798e08a938855e439fdbf248a70e24c1ed0675a4aeec63d36ede266f3594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3022524afba08d822023056cd041a19
SHA11dff3500009bfd0ef58c798c1221d31b4b053565
SHA25612bf938687db17d7697b303aa2a74e541d5d855a8405c2e50ae811fc29503259
SHA512b22270049166d502a75d31595e3b39535761072c22b8d45acd3736c1004cccd14878549849863a83e42c450a6aea9439dddd67841cceb28629ed23b45ee31d48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f33468c5ea420ef6ef1fc8938010ad97
SHA102b76d7d8db5065c2716b674e3cce572abcd57d6
SHA256555aa71937e0e3238e48832e0ca16013edc90c4119ef8191cdbac41f0a0253d7
SHA5125f2c215abe0f1c9de466a052545611fda26401c0090111940d44bfaf2f12666fa3b124f0ee49274a5ca243820c97453fe779d7f6be85a3e58dc0e8bddbb5b19f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507f154d0ce265ee8688de57103233652
SHA19e175c2608aa5368ea98c03329ef8d3c45793f05
SHA256e1d834c5c59ab2c7545730cba898ac9060852684b61087f86e2b17d985da27c9
SHA512567a8167b1edfaed8a126781920ae60d583bffe9026b74a9b3089faa65bec1d141552351e5c52389c053bcabd366d1be21736267dc832fcb87841fe494f5b383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d31ed10e3933f6074c6dfcbe327725bd
SHA14d642e04ca7b01865a31a92f3bacfadc04d3bf78
SHA256d2c297ff99f606322b2e0300e169fe280575c91814a8fdeca24e9b3e4f768925
SHA51282dc5d56c773020643ff66d1a6868f2edff56c09186adde5ba307db887462ec0d518cc2d9b370ad1b07a0837f159f22e3db9f156c6a2b27831f1de9dc01075ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7acbe5265c2187b2218b21053ca79f0
SHA152368925209fc8cde50e24877fa1699bbe9a0e1a
SHA2560049b08adeb4962f5a938ee19f0c4a0dd8bcec310a5c3c1954b4c3660b217742
SHA51225128d8f712c036458356a7c4f18da3423147e10eef55d9c81bce47e925d823074d0224a38a3210bb915451dc6580d2b2b05aea8f591890102946772636fffcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dac9ebb2216404361650b7fc29f48fd6
SHA1f21b8e34ded2706c26064ebb0c08d3f5202dd367
SHA2568fe84d705ea705dcc274db89d5f4918a9775eff239489430a49a37c40195c6a5
SHA512e64f66d09f6f10c611b3eadd698c5b3eb553538d71f6a16e30f3ac7da424a4fb55668363f470b3078893d8263a4b22ad668d1f4d630e154b0ac2907510728cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a4c6eecd8c0ff36dc93e1753b8b8ae5
SHA19c0db0031c068aca98aba3ef2673480bf725b320
SHA25680539f0686c7b7cf197ce2a5e3aef904f589f4158a47d697f9aaed8a6dd88f6d
SHA5125e48b8688f6fa393e916ddf4314981b6e4916bc6f071f11bca0c557042b9e915a647404b0fc3e257d6ae097c0067bb5ac6cee28b0964d7f9038bd08fa7169830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b971f5b1ea44723714449bf348240bc
SHA1dec0965159f660c7f9193bd5a17a6e7bdb45695a
SHA256909d8df4b1ad40ce9b9baa850976a07276d7a3ff871d2d798a2b8d9923b31d2b
SHA5122a5dc4fcad4b0c84a3f8b092d09abf97c41de48526554d502d07169a7c6e460918061368c1841152cb9c4b0aac6e4f2160e68cff780eef218613a5cecf713d13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9fbb40efc69f04039c3d64afe0e0020
SHA1babd5de5e5792c3ebac61b105379cf8bcdf4eb23
SHA2563b2269e7ee5e047acf1647837d3e7b6349074506383d4fae7ecf78d90c8a9caa
SHA512008fc7ce6db535c09d7e15cdeb9a08d6323254d28f1283b8f2fe08c0ed62c00e214d0fc9a852b7b5adb45904f8b9c97ad1b323b2007c53a119d919734eff23c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4a4674b0243b3642f08bf9e6cdf9ec1
SHA15c03d0617d116d71875ac478c9d1935ed8553732
SHA256dff21f8b3568dd6566a5f29239f6c5cffa7a939878c01cb241842b69e94b2b2d
SHA51264dbef12a32390840427212e0f39ddea6cfa0f589add0abf088455b445f7b4015f70b6ea6022a3a3b28c0a4254fdfb21a0d9e300c9741bdfb1b231ab554c6dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c2d226bf66315f158f59c4e286d7a10
SHA18689afd08c2b10399195b49bd24df6cb53c61a25
SHA256ede605f0939a78f88f0a0ae9a5b0aec9ae5030cc5bfdb538f85fb142344ae7dd
SHA512262461cd4075f5a2d55668c0440ae4167b90037cab6caeb5d190ecb2a31a3c3640b874c11e0b8729cdb429194df60e4d7e6cdba2cde9342f927c7aa53129f761
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b