Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
25fcf27d6d02e83aeaf343932939862d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
25fcf27d6d02e83aeaf343932939862d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
25fcf27d6d02e83aeaf343932939862d_JaffaCakes118.html
-
Size
139KB
-
MD5
25fcf27d6d02e83aeaf343932939862d
-
SHA1
2f844be2e28f1fce5639a8ca79e3f61a50dda2ac
-
SHA256
e68e7361802ee317abe804576d2087afbb88b6b09732bb7a18e00ce4c23fb5a1
-
SHA512
f9a67e6e2ea6e7679f5a7b30b31bcaf357bb386e886b3d6fa0bdee7ad7a8b827ecca684ef1da087ac6f8d2a5520cb622da7072cdebfda62485a4febfa93fdbe6
-
SSDEEP
1536:SDn/CR5RTXJXKn7fsIklFyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wd:SDX2yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ACBAD801-85F3-11EF-988C-4E66A3E0FBF8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001fb329cb2df22a40aabfb9cf6794335b0000000002000000000010660000000100002000000019853053c3dd43351fa4cdab48c95a7b8a3391156b1117d16ec6261079760259000000000e8000000002000020000000c2d940514bba3eb4ffd7583f761b37dc653756451a38f6d00361195380c39ede20000000dad276edcce1862c4906175218864a10750a116c1853b197a9856b77d98f071040000000707c7458cefda92a1f96ad4ff92d771bf107ea2480df56f1b2ddff11f148d6105f6aa9eabbb981f5f446b7254a9fab45c788e893177e46c70c8317e6f30ef61f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434608577" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602dd6c2001adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1908 iexplore.exe 1908 iexplore.exe 1876 IEXPLORE.EXE 1876 IEXPLORE.EXE 1876 IEXPLORE.EXE 1876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1876 1908 iexplore.exe 30 PID 1908 wrote to memory of 1876 1908 iexplore.exe 30 PID 1908 wrote to memory of 1876 1908 iexplore.exe 30 PID 1908 wrote to memory of 1876 1908 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\25fcf27d6d02e83aeaf343932939862d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1908 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e1b84f184e6a0f3a6ad353255a31178
SHA15592286a97dfb45617817263c102e61bda2a68cc
SHA256d24f6faf3b9100e66472492207b6bdeece53e2a6c1917c23df7d0abb155d34a1
SHA51201664a2d624670219323404795c190b15686b73db6e9fb575966cdf4f468aa49f7c3e3989f5ec962aa87ecde931cfd051accb47e5e55e81e32d05a3240f372b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b60e422ecbc9ffe446400369141f3b3
SHA15e03ac0052d5259d3c6f753291068f30d63186de
SHA25672173d82310990bd182de4670c44d0408b33fd871c61a06a0ab38a1c13a85a2f
SHA512b679fe6b306524df38b8d03e7b9a579a4f2ba9ebed4dcccf1a24a6a9345026cb0a4b195aa92e7cd09afe6fb637b9ab3fe557a1cb2ef5b3b058b92c9c88298a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aa98a631477cabac91d28b75debd8d0
SHA17ff75823f058cd528539822be50a7d3dfae46fd6
SHA2567af60d52f12996391f7a1b8443bcdcf0d34bb9c5d6d2be34b18ff473164e4a23
SHA512557e227462522ae934b8821383e0d713fb78c925259aaf51d6f727584d00662131db2965a5fb41c2927e56da8bc8743ce80273857728c5e029637aa48afed8ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f65516447971a8034f471db1c09350
SHA1edf320c975818d1c059d91c8c6c7261768426b2e
SHA2563af99f28878d6edc69e0fea1501788ebffe71d62019ba063ba0c7f41cc076e15
SHA51260d63dac879a00d4fad5202a1bcdcb8eb0e1ab58f625006684574265c8615e9b11c8bcad441526f157234107e37ed8a6dadb15f3a8b49b31ca1b86825fe1a337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5034687d7e3408db1edaeabc95d8d3f41
SHA1bf4b4a7de77c6b8e0edfee7de1d47a230f713826
SHA256a9cef8353df2eb24655b1585a5310014d48d3707c8450b25c65e15798051ad2c
SHA512b1bd4a02a9b3bd28bf770fc8e51963ee43cd77045097e63730ab0062548a551679887c77bec22b3ee8e426d478c25af21a178fe494af73ce0b34d5bd3f78f7ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a41b512e530ff2ee952f8972590fac91
SHA18cff6328915e320c504fe4b41f7da1214a6a99ae
SHA256bea4e6c5523f493751ebdeefaaac90feded6d8825a250c683ab005f2286e8d11
SHA5126b12c4f27a8cdf8e72e38925a21ad8fcab80b897c489eaef070e38ba6b038b007097f762d485587ea94040cd5a8ce5d6f8ea9358a0e63d7786eafcfffdc9a87d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac5b73b24f2497bba0a4cb0203cef12d
SHA13733200805bb93174124c6e0b94604847534715f
SHA256fa9c1c1df4ea036cf8b0eeca6569fc5278330b7d7f165e9323be86d4154c52fe
SHA5128ba53179359e3be146169a0cea3988016cca17e57a6ef807917ed8a741917ea80eef09b0dd81e37b8a17fce70d8b23ea94c5540d3032198254a0405bf7d37d88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536486f7493fc124fbd22af4de10f8c66
SHA12e26e89b1480d483fa880f50643435797467e358
SHA256f31b45cc594505ae2671c82e716de5c827fb1f545a182d92588c6178d446fd53
SHA5124f0faa5a82575eef7695b3a0621764efb3ff75f1e94b33bae524e8774363c0f3379b22292b769e42d54d61c2c97d71f8190192c2050e017513373f86cc0ae432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2c0009b486c86eb0b6497d700923866
SHA17af7e4ae72e170cc3896721ed2d85e1eca56ddc6
SHA2565d2645bcb324e8a783688c1e2c352f7968abf568158ef359bfecb94f610b109f
SHA5124c5fa8f62bf3923632e5369e4d4b8236934b3c890d4c36536c2ed66626a848fb27dad28a807eef3b061421944233f58529a4eabb2e950b5802b9bd7c8b896dc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab136ca0e9f5df88d8b271275ec1e982
SHA15d5f2f197911321c56f5be848667f8a67f542c23
SHA2563cdd6a79c37033013f22fae9aed8316e3e12a43c3e82054161f6f93a2370bc6b
SHA512da432df40bcc16bb3a81b9dcfe355c787aa82601027945491a183325da2e8735ad0496bf60060692e2ffd0f760c9c698d32eb0d7f6509bd381e1c14775fe5204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5047f896fcca237ed7b210df976b28c4c
SHA1f36b9b0ba7b4e1a339e4a7db8253218d456025e4
SHA256b42d0e747cf3f7f38c2b3e281bd969680b351cf180f82648c85bb5a1afb349a0
SHA512bb82f33e2ff32926d37bc23d385734f494930cf2f31cbb8f427351b3fb113c704c2f5b32202be5359f30d2129671f1801c8e45ab3778b894e5d78791e0c28aec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5883538c56bd79e62818f8d945f134c74
SHA19793e639d9e455df31d5acc237728c9839b895bb
SHA256c0faaef6c31aab1c8ded0164396dd4f2937bda65c361c7817f6f20868e0feb51
SHA512884a133e521acf0687245fd6a511fdc6a2f222a6bbedac96c1a4f316a0670bb7b2d81e7874128d47b61398dd3e7e4ebef053d9b0afcb33fc6797a8f3c827b322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b09cd5e516b0347a552e3a35153a880
SHA12baa109b3a378c821ae98f2edb1ffeb353aaa59d
SHA2560598a946c67322ff32be164450f5cea445652dea0bf8cf8e749e44a7179ddb99
SHA512ab4e3878c0dcd3c04dc8b48dbde18be8e2f508e5d7a1a403e09cb630c04d5f6b5c093a58fa0695ce957ff42d9fa6afcffb6326d47ea02bf5e8a7ce879b85f691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7ea55422c9615adcda9f8dc2b7b8dd2
SHA1588c4f1056e687595dade4bce16d080bef263f42
SHA256b019543404319d91b7ac02ce87c75c72d4d59378ef591e286293165993cd7270
SHA512f64d5686b217e7381d5bd01f9da38640d3fb42a106ce2ce5c07b0ad495ad63bba5671cb1a74ecc82f889b736a5b7dcb5dc77d18fda06134b82df414b5c2a69db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b713a60324c78da2ade4db2759275a9
SHA101fdd738b583dd18d57efc83b78e8b2a220993e8
SHA256b6c26caadf9e67a1e743c2ec5e61ecab4d9f201be5c4f27db98d2a460b7d42e4
SHA5122726c101b679d3d8d26fabcf9403256c0da5be954d0354baef16779d243cf429ccea853ca34f0955c369eb34ecab9c017a828e868267fbbb68a65b2987dc429e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ee62533bc9d29a6be9d3e750e92a507
SHA1e023fdfd975666d7f5923d1e241c135d318a91e9
SHA25609aee69a35548acb83b09bbe89dafe7feae992e55e729c563b894fc3322c9d98
SHA5128af9d4e075edbc0a150d3925983a61e8ffa61d3d3e5113cb0dacb5940fed2856d7807d65df3dd4bce2f8140530d0ac5b945dc706557ef6421e5b662011352a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5594758276e56fb494c4b87c93ddcf67c
SHA125dc77076f302da44d81fc64eccd5be794380ac1
SHA25683c3657fa8fa02102e0a4a86239ccbb1afe2db76495a564a99a530e18e4b2a53
SHA5126858c6f94a309114aec220d818db10824edca599bc7c27d6777a8f9b328e9f814423f35fcc1046909f13175f7ce9d335a4667fcc0f4f90bb272e83e585f7b216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c672233bc7ff13fcff03217af3f13083
SHA14211cb414d4fc10100a8cc27b3252b5160d83e13
SHA2563e49145136493726a10dc5c3c20528aa791b0606e8b9ad846122b48fb2e9408f
SHA5128c0d798428534800a7fc7cdae15c9939897713d5ec09d1e3387c397905cc5f255d33133e02262e036f9a23c99d8bfaf9f133a3f51afad974e794aff3b07b4ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528b0fc4dcca014af9bd93cb0093891fc
SHA135c3946388186ed75718d4786a307ca08ac63277
SHA2563650135615e2854e8f726e84f1cbeb583a0df6a0b838d24192643d70132cbaa1
SHA5129282ea1aed1b767f034040a213244c4f954910316081e59b869400feaaad4b5897909e3f9fe6ee6ccadaaa157e59276ec7c2027b862c6853253450dcc180ffb8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b