Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 09:39
Static task
static1
Behavioral task
behavioral1
Sample
2ed4ed26938d9749cae0a0751ebeaa3e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2ed4ed26938d9749cae0a0751ebeaa3e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2ed4ed26938d9749cae0a0751ebeaa3e_JaffaCakes118.html
-
Size
53KB
-
MD5
2ed4ed26938d9749cae0a0751ebeaa3e
-
SHA1
0ab6f4c6c8de8df001bbcb3b2e61e79024bd1355
-
SHA256
a730c5b8c645b8fb45d2bceff1dee893a17dd276e7060b406e8fb978d202b7c3
-
SHA512
b545ae50d75142e8b00708d7667dfcc0272edacab04561bde1a10f3e2771e391636540ce6f7e93651af58a004bc7c870d0b2334790e90e8a241c85867fc028c5
-
SSDEEP
1536:CkgUiIakTqGivi+PyUorunlYx63Nj+q5Vy0R0w2AzTICbbKoi/t9M/dNwIUTDmDF:CkgUiIakTqGivi+PyUorunlYx63Nj+qH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434673768" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{759083A1-868B-11EF-8EE0-F67F0CB12BFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000029d9f50638841b409ae11edfc99b51c40000000002000000000010660000000100002000000019c4fc94b81ca7c0e5eb4e3841e03a7ebcd83c4530fc9acf70c47565679e0ee9000000000e800000000200002000000004a89b58ea7ae65897eeeb3f706b46f67124dfb0c37f44053065e35b4951c4122000000076657b615e1d4c40783216c0690a2dd73bd5fdd1e9d489363ce2ed5457522dfa40000000c58f8a40acde846e5f87342dd0dfc49f36ae1ccbfa689c629123be79d58d8e34b03df01ba57d029e4caeeca791af32f402e252abc59642d2b6ea0f7cdd323f5d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9076f94c981adb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2568 iexplore.exe 2568 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2568 wrote to memory of 1612 2568 iexplore.exe 30 PID 2568 wrote to memory of 1612 2568 iexplore.exe 30 PID 2568 wrote to memory of 1612 2568 iexplore.exe 30 PID 2568 wrote to memory of 1612 2568 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ed4ed26938d9749cae0a0751ebeaa3e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbf8b1d5dc555e1b4f00677f6db284a9
SHA14fb260620254c555c661cb280dbc7699211d9a37
SHA256f70876599c0beda2415465a2b1932c7c6172ba529d20f952b23099a53042f2f5
SHA5127758267aa73da5c9c2f829a327944dd9de8391825ed9ac77bf2fdda894325d33825b7620749b6ae4dfc4c309af06c1aab25b63b532e07e3339ac9ff8ca8168d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57decd02070a8d24f9a66a7710ce37df3
SHA1ad6564ee3b49f5fb48aa3c6a69c588e9df8a6f8d
SHA25634b47943848ef02da8fad90ca57cc041ca3323359ca9a09d97aa5a5921ef18f9
SHA512899e637ba4033e8c2133be3e6ca906713d3c695a9f265654c9d8840df8d0f12def4b49cccce3c838c00d78b1923b83a18901a9ed4787f259c8a0cbab9a5dd650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d15c3dd127d648cdcc1a3eb5cf8e365e
SHA1ca050d67dfb92a2ad959bf22c62968fb9a07e98a
SHA256b7c9a24798f61218245a17037f90de7179a4a54cbe24dba20747dd1a52cb630b
SHA512b3c99c8bd6c951071cf5d4cde0a661debe11105d04384f9078d7493af2e2e684597c28be832abcf97396ad2aa27447a31339d6cd8231bcdb030a88932440858b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5154806bd0c53982da9ba81f7af2a9e50
SHA1b245e17be44e258bcb94581f0a05b9daf37e39f6
SHA256d135d07a46e84ce1b1a3d9a3678c25630928a7d1cf488a68823dcd25f8035fab
SHA512fccd8dd658df8af494ea2bdd27978e93ddcdfb6769c6b5b3e92ada52cf8bbfac54bc52212619efcbedd843b274294c772f88383cdc54e0d1a301bdfb946f3e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5689c08d39018ca31bb8d060789bfbfb4
SHA1e455c2097c4920bf27fc6805b0d4b4f69853c549
SHA2561ff7b6e675c1921207c0d9b28e3f2722c5fe79585b0eaa249bdb4b658ef1720d
SHA5121f40d4080cb7ff842fd31023457c51ca39bf4e1ae60f58d6c5992ada06f41ff69614e2475beecaec8724f93bf0aaafefd34d9c6265ae0bc0dd5aed2d88307ad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59403fb0e3e9f5c3ec29e9451c98a6f6a
SHA13230b0d88c8b913aefceda3a026ac8c7ffe46637
SHA25641106a6c9151cbb47e698fdcaceb619febc96d9aa05cfd33e1a5a4e7f60c01a5
SHA512aabd1be3ada78a4e0013fd22d583802b983d7b5a36cf0ba5852b9b50ddf6d3ccf5866f68e54d115257022591144910a987bcf7c8c92bc503a3fdd884c04b66e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d083c89fbe70f93755912f35531ba35a
SHA1fad976fe386a1ca91b10b5470c29999e515e156e
SHA256e1d9b37696ee09194eca71b0158ddc5d8e21bbcb0b23549756f5c69e09ff1e64
SHA512346a07930b20612b64784b8a8570b06ec409f92a9e5390b042fe488e49cddf69af2a4b675b5ccd9eaaa9a342c833a9447152c9d6de8e5dc527140e063fe6981e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a42bae42bd77dee503a924e600cd042
SHA1ab934af9f20b53cdad87ef8aaac3d56f4281c7fe
SHA2567a662782739ed02a32694253efb0dbee57699204b80615096d855b0b33d06016
SHA512950011ddf01cacfd8fa879fc68dd39ea90a3ae13e53222c88477e608a974da0a7a32489df0cbd02ade09493d6e903fb28edf2a21c70062f45bf10f90f03f0459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b637622a7a5b27d152afc7f9bef17b7f
SHA12ba2794538a454217fcfb3613843acaba11627db
SHA25609f266aafe38808aa65e2575afb7ea0cf520c005303fb94bf23d7ae8d6a6b8a6
SHA5122e1bbda1fcb27e36c1e6303c358011072515f7e47e5ea28e3de35abb5c44b5018971ba74984d821b900f95ab6190359e7b69fe6cf4c3cd3aa1613d17291e2667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578ee3211eec04e17e242b8f1dba758a8
SHA1d752a4cf1a95094e45eb5caa2666022c3733928c
SHA256ef16aee33fde35245604d281264c0c72999b25a463cab2d1858b4a05ec917d1f
SHA512794631e11efa793f30241eb519050d06cbdc9c6d43e3ac9cfbaa7a81bb6b0333f3be2c652c1a6fd84862b17ed7f6d7c9abb3cd5a7a64c32c26a2f311d20ed7c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4d88aa410ea09fdcc153989b6f7464f
SHA1db1f1fcd0262294b0bd272ca9cfc87795957f0d5
SHA25603f12868bb6976f4bdb4ec0f68e40cd7ed4df745c31e4f72cddf4629a1c3852c
SHA51247cde0331212405ae1184dba930f50f5982a5870713b42be4aacac27d2945d4858cd54c16e18ee7e336325e5ab9f48a8cbfb9d07f40370344c961f663590b127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f791bf3925e666724d769f90a5c4253
SHA1783c658fe3566d10b2514030c91592a4cafb0f81
SHA256a1f84b781a606cb307b4e773a89a2685e3c490cdb493804a5522129956bd674d
SHA512e29e0c2f8aac2d3fccbdf0f2e088daf47a86ef4525dc1a8b656e5a4153eb030bc3bcb35a085962c137ae4fdef8c39b4b62c0b9d60f89e40c784655cbdb65c91f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daeffd09ae04a3ac62824c8bda216247
SHA1bb12d4f04b0d2adb50b6d35043ba6c64b2dbac61
SHA2561717020d0db5864672c2aa8298c3f151133a343380614c3fd1bc1c8d359be2b0
SHA51244fb7a6694810035b1775d53c4a36307c07923d876dcd5593dc1e5b30a4838a3a36ca83db5b954792f7c8d1c0191d452feaf78d15b6208cafb744552248335e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e8872fc7a38cf20f09a4ff9bd6735a6
SHA1eaa96b794a8ea45c0bf52b7a9d5c66b5c60abcc7
SHA2560a965dd06ddaaf39edc765ba257411367821f6a398ce1181267526e40c1c05a4
SHA51217072f2e1be0206baba4684b1bed9af56f00b6d10cd1e90a75065ce06cdf62af693757aa092d6e1fbfcc9950ec64f062fc996fd2c7275dc7cc4ba1ad6a2f1ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55912ca47f81b142ea136f9a4d55b8499
SHA14caf4cd837a63596d80c115ae5023d2507484a25
SHA2563ab49e9748527105a7ac6f5665d977a2ed0d2e3ba3005b69b32db096de8e2586
SHA512acc852d40ffe3be70483c121af6006a2a512d0a09405845fc95a54dfc4790e84576701402d540dc7ba261b84e0116d1fd02616fa8e7870697bc5dae3dcb82f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f67930c12a7d4fca252c4744a18e8467
SHA1688464df4427a2ca0208b834370fd2434ca030d1
SHA25663fb36fa211a8bff1130c244f1e02f780710a3e03a95faf68b8c89923044ebd8
SHA512b9bbee8e9b66ebbeb793d0d40f6f7f4d3c09815ff9daad653409991f0c05ce3facc2e6ce9f2728e5ff9a43132ad357693194c205cf0ba104530858114e730a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc790755a4ea24709c73023f09d99dc4
SHA1a0da439692964b8b69978b1a37b70f7a2ad59493
SHA2560650b19699e57269dd2428f7997bb13babb44e77e1ea2478a9b13cef096298e0
SHA512a585a9fb32a2b0c2ece6a057174fbdcc309d3d624ae6d75ebf42d6880175ca3e8063bbecdb2ac5e1049e8b34d1e1d097e2f744844a63d97b2c98ccba8e352944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e91b1bd42f0f59ec5d2108a6a4e982c2
SHA1c2cd17a0c1324f15ae80bc02faa076bb05a2adca
SHA256d77bc4d16a40a5c9569f664bea2764ba2ef86d940b9a2e1027143829cd94b866
SHA5129baa2b316f95c73acc5c7671d0f516f06596ee031c2d31303e41235d6f9d3d15a84d12e92b3a90023b3702ceb773bcc9d970f4ee264747643e2c64ca870c1a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541d865fea66e687cc3d679b3c5292349
SHA18cd6680da4f0cd55cfd330ac40cb465d9eaaa0b3
SHA256581edd25d5a5a864bd3003df9b31ca04aca335b5b2877c59e95ad1cc14f267f3
SHA512cfe750b2eca4a52f18c5c69dd65189e77e446f2d8b1b6c2167bc2f6c23498381785ed91814dde2a7a275d442de675a5b65150b50200f1ac6cf835fc932d354fa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b