Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 13:18
Static task
static1
Behavioral task
behavioral1
Sample
05f7032c6c4a0b70a59edf057f9aeecf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
05f7032c6c4a0b70a59edf057f9aeecf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
05f7032c6c4a0b70a59edf057f9aeecf_JaffaCakes118.html
-
Size
301B
-
MD5
05f7032c6c4a0b70a59edf057f9aeecf
-
SHA1
eae0fe20225dd76cdb32fded915e86848cd3bc15
-
SHA256
71160b99648fbe48a84d1e1319a1d6cca9a72751d7434b8f2cf584d547487f49
-
SHA512
67e29bc8b6921cd722b9d793ac05aa911b69323e5cc38862597a810210ab05d2fca533d2270311c99ce5aa8f64ec03f1e277d339a58ea7d4a6e9f0e87389142e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B34194E1-7FF7-11EF-AB3B-C60424AAF5E1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000049fd459552d554e58e8796eb74097d3968e7a97840fbc13905f9d2fd81248f6e000000000e8000000002000020000000579fc8aa44e9aada5c95bd732ccd96f44c79ef718594984509cf5df5a05e1b3b90000000a07680dc0aed781145c62fd9e61a3ec1c7448ecaaf8fc8a59de7966261dca827be1e3fff7729771e0ccd7eace3cfd9fe8a7fcb7bc7f9f11492bffe16890dbd29018ac8d0e6f8275f3a0592f68b61baca84bd0ac12369689ac79afb597890b1451aa664e08f3223fca4cd4e080001e55439fc643d7781fa1f7d936ef5acfa5e1e15d7716422f819c384c35ee3d2ecb8aa40000000c38f8508853ce5871f3c1ba43c0cc62956c31daa14d0cdb7d30ece90a682829175cf15f8f85cbf25d6a0046d1800d7b856384bafd006577ce926af784ac15fba iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000b932cf83280abf343db3eb592665133ce8bfb27c0155426508c2850625b350a1000000000e80000000020000200000002e7bc4a0b010f93a254d7a2055d0bcc82d40bb413300ec9a7c8bf16aab5dd9df200000006f75b24b4367eb8bd4345019bc5eae9133365285bb93d2ab4ffd1459235a735740000000150651ffcf9178b735996c44e8e306209538ea815ccfbf16781f7801992b39f303e2f19586f58525ef0c2b2e6fe53f7cfdf54a6f21a375760a23f15b4ab3d13c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b03d5c890414db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433950599" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2556 2388 iexplore.exe 30 PID 2388 wrote to memory of 2556 2388 iexplore.exe 30 PID 2388 wrote to memory of 2556 2388 iexplore.exe 30 PID 2388 wrote to memory of 2556 2388 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05f7032c6c4a0b70a59edf057f9aeecf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568a7c7ffd025e8474acd52106e9ca71b
SHA19c68abd00c11184ecb8fe3c37d324bae32c62f48
SHA2569c15f7a716441bd792f81a738fe09b43e66893e045fc6fc6a0a392e2e5d0f75e
SHA51216eef704b24541e422e9308a64b65d7da212612a8802a7748aef4de229c6db6918a367c91f2b2a4507c9a20eeb6dda138aec7807c60a4348db209179cff05418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584879855b6eb699b55fcb70ff945cd4f
SHA1912ab4451daa777de51917393e0546f0dccf2553
SHA256ae512b9acda8c3a442cc94dc11345f50373c45cfb31c9381b029346ef3819ec2
SHA5127cb0ae3d2b786c79098a1c0798274c7896c39866cb43ae1d0101fb83ca160b03cc5a8ab60789ee26782564afce31da89a1458150e8ac59d92519dc40b18df74d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdebbff1d73e168fdcff8fe2c334cf19
SHA195a17f9c2cf2649ec00011c33684ae0cac6af443
SHA256699fbf0c36b090eab2a699a48b8a323f963939011569eb3a8fa696ec718c2bf9
SHA51285867c1029978c3410071df7cd67ceee09a4f3f464854a730eaac46b4f0abcd9a4d35cd67f3864689b8d491db6c18607433cce93a6805d209499844f05129bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5014964e660c6f1efa69a999dc530b58b
SHA1f3636a03faa0f44a64a4e838177b77a23df43848
SHA256d7a91548d52aa39a1f16ce34982db5730fd33fed3db6e113b5c4282f423b9e39
SHA5124d577a9d83abc0eb1fff5fc50c07c716907d9bec97eb220605d7bb841040ec57a92bd0890d7ed6003892e37cd402fc5f14cc8906af54ccdfc66f5677f8cfdb34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ce98007c6538d532d9aded9e0a59504
SHA1593d89b374100e2d5adec71d8a443731ffeceabc
SHA256fbd6ab204ac39f5787e6607a054a425fa14341393917ce9f0ff6d425b43b290b
SHA512ecb90c0de1ac38c1b1340b56160eb6b71216b4277de273b6bcc9b016a2cb2aa63b8e3db00947d3bde60992fe092ea8675f28d38a4b3d4642d85152f25a1e21e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eb5a9e55595336983a05be15035d400
SHA194355bad3e92e4df838e5f09860973c922dab013
SHA25690fba7fe7c239121b6417bb01b53cdc7b8eab84b396ec9c6c859c5a9d75a2872
SHA5121ad04f234f27d83e7ab44097d678f57e0ce1cee24f38103de835d67c283f892563bff8a8e1a9c93e07ebd10f724915b6df4fce860e130a857b46fb0de5f6774c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d92d45e8a1bca50c2118294c73dd72a9
SHA11322615045f5821ca986ba971f28f0a75e0ace71
SHA256b45738bf61b5d18492686bfde5f2320efb69f17c328d11b58279fa3578a037bc
SHA512345ad1ae0809897b681ce438d4d3b7a50f1daef4a5427e7e75291231c2da12dd0cdf944fcfbc0717b52d103b662582338fbf7d5dab383cca73cbb3b9f7331d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c63c027314ccb6fa73d94a12eb49069
SHA1006326310c2e5e1fce645c8e5f074b7661e00945
SHA2568c89e5e8e5904657ccea67a71927d84909d9c5c32060a32fe6b74dd9642f5999
SHA512d0eb1fed952b3678669890b2e00d26d927756896c34fabbb544d22988682b4d9922323de9c890973251c138c9756748ecf3f9dd30ba64db3c63aacac6b140062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6edfb8365191c49f6d73128efa8e9b3
SHA1e9bd6bdd672605bd19513e6413019173fc554c43
SHA256fd72bcef00637e5eb6f23f3107b07de61a29cab7e66e3504dc3ce09604525edc
SHA512cd5686f46a0814aa15dd3e18b656ce02d629730014620b1938376e6371adbcf3c203d6243549588df41b1b40bd4cda8d39d0e0f74c7cf6c79655ec5c0c97a667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b34b4c16b74d9eb6c4c137053cc5c82c
SHA19d3c636b0588cd9d298b585dc8327e097d9149ae
SHA256cb0897c437a2c62fa9207914f92a6bbf07585559bb53c05169b82081ba8a5047
SHA512acb9e40b097b759e798565ff1d18ae3a629c547fbae8acf2d071d77bb5ad51344241d0bb36e88e507ed2c878e243cf7dd3d1528bd0228ecf9bfd4f13bbf6cc7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bba69d4aeba375cc3ef7bbdcf06ad248
SHA12668584928e2148c9757027e6fb6e6a526abc318
SHA2569bfe773f46aef64160568b83f5f5a9a5c4804aba69e5de910230e46d68a7dfcd
SHA512105972554cf33935b447eaba8e8ca437a9ecf5b1742a274398b8da7f568b71bd2f0eea0fa7cf35b022520d47cbc9d45aab6a5a4198aad89ce076fe339bac0714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1722074fd63ceb2d4d623aeed6195a6
SHA193952f3a6163d87031bb69c51856a4c915daaf1f
SHA2567ad2b6f4e55a5c81d56bd53380f1b9b14d9e7743ad467b0d5ab9a696509957e3
SHA512506682bcd3d147d26fe06045a129329aaa13d4b6710def16098c517706772f5beb13f2f9f205e043a411f86cb75f72490e9c374ca0f9db96f0dd25a6465dd69e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540e95af3f93571f73e160a18c3484761
SHA1b147ef5a856c51199d37b6b75db9517d3dec9a7d
SHA256ccf25b09abb44801d8878b41feaed357ea12f49d379b1386d844a49f1ad5d9d2
SHA51220a940b5ebd054f7bfda8a22b335a42cd1a9b05c2017ce6da011800bf569f6c3929a395dd57970c376b9f9ae2bdf81bcb37c1eca3dbfda48835d28ee50a413e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef8333daa08fd2c192687e4459076f7b
SHA1f0df7278491843ce2e9f4d13ffebf653bd639a3d
SHA25605b3052dabedb747b6688f9343e6dbe72df72214db90d5a8cb9f99f43185b49d
SHA5128f3d846d2e725c518c8885b805b823212cf988d71631881946948cdff36d00c37e7c6192f790322e8bf9502cbba8a44737a9163d91bd1e1f3a9ab75782853fa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583e2c394225cea6646151c7496ffbd97
SHA1c43604503262b61b8c918ccd8b4e464fe4c9d77e
SHA2567ea53aacd6a9026ce1ee03f7593b4d4aa4aa3fcea663244674f3d2caf18f913f
SHA512250c5dc02d7fa6c5a9068b1b37ab9dc96e59ed3158fd864c33202dafdc0a0c955453b33ff3ad8d95c84a8cf062c7a8fca825c44088169058979f209d753d3198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4df324b31577e9819b585d01eac742b
SHA13fcfaa489905b81e2955af36c8c121a0628daf2d
SHA256004273f7d51184bf68f08ac5c26d77dda3ea177f312bdf7103279719f13dbf60
SHA512f18f63680602ff551462baad0a09927d589a9a1ef2b822c7459f13ae0c9f3fbd7b14a402495264fec94f771ff71db22056408052616f5654b782982fd366b407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531dfdee5e080b06f570e1c318cbe80f8
SHA1e9510d981b09d3e2db0a9d0b26bc1c19dc9c620e
SHA2564bcc10411606693bff160c64d96f3724d8c0a0bf19e9c850d3c16859707067d2
SHA512a6ff9373e5d6a39049e7e116aa7fbfb1518120fbe9d03e08309d5eb6539687a2b22a6f2c302ccddbeca57b76800694b8b0115ff2d6f833ad1023923a7771a1ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5764e7d49a24c98d4c7ea7c393d8c31f1
SHA1a8794a4e13e012d0a7999d2701eead0f2e1c9bef
SHA2560c7c90d12a8cebf46728bb38ca06c071bef95d77fb9a84a02d2c351f26a0b49a
SHA5125fca0388b8c50f860a7b6301c2cd1e792490d0d2c19547ab423168c5a12f499f345e574bdf484a9a214fcb5f7efb6247724a3c88a4a342485cc434f749a1fd6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543f63e3bf46d61265831cc2a9460348f
SHA1e8d2ade335e43c2c67507ed6b5ce7f2a6a7f16a2
SHA256b6de9529d708f36cef381fbc385fa0ebe68b84689b4e316e0b077b483f79f026
SHA512238b0c377d9bdd7a69e25c3589e1f9256ffb0edcd866883ff670cbfdae41e083c624e47a6d3eec5106cec4e1850b865dcb548c8a7d5d7149cb9b3ef94d5eab20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bce26f5a1fad4001a81354827c7b7013
SHA14202543dab4d41330c0f35034ca3eae3ea3a555f
SHA256b7ca8620908a3a7a827588c260d6eba854af1f937ba4bcabfeb1830afdf762be
SHA512aee88d46d1f77d73ab175125c036746a29fe27c5258b3f3ff420dc0d631460b8e12a687ae6a0bf1a56ae0ea993dabacd6e72230e2a3d55dafadac9a98f47c1ae
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b