Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:11
Static task
static1
Behavioral task
behavioral1
Sample
b4ed94c3a0b416ba22f85307d2316d97_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b4ed94c3a0b416ba22f85307d2316d97_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4ed94c3a0b416ba22f85307d2316d97_JaffaCakes118.html
-
Size
213KB
-
MD5
b4ed94c3a0b416ba22f85307d2316d97
-
SHA1
e8d75927f06d0f983c9e3fc3b720d2b49cfbed1a
-
SHA256
c3b400fcc420fbb594f7efb119315600ae26a7f83d9f4d1ef73a2341e1011a0a
-
SHA512
129f5cbe91f29da21870f6ef439d1d87d2b7db9d512a02eead353c5c8bcec2f7d813c566b42cfba793430b104e249550abb97fec0db0200eb4c40240480bfc3b
-
SSDEEP
3072:1rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJC:pz9VxLY7iAVLTBQJlC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b96000000000200000000001066000000010000200000000c7a721c859000eaf71c8323adce17fc900f364b4d6296ed3e6cebae5c637ec0000000000e8000000002000020000000f206f0fe1a19997d7bba9d38d8dd6afd4ed086bcb8e7ec99f6a535acd877c970200000005744878bc7807bc3a67e2688bb1b2d35acd47c7bc6b3371f958848f2a2749c0d4000000094c18dd0b3f30ba9ff9882fe3541a110ee5983b405c454e50957fd1953f8330f78bac5a1089e85b1dcd583c11489b61d4b1374ef283fe2ef2fc54a00eec1d5c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439105345" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{874C8551-AED9-11EF-AC67-6252F262FB8A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3027ce5be642db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2620 iexplore.exe 2620 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2584 2620 iexplore.exe 30 PID 2620 wrote to memory of 2584 2620 iexplore.exe 30 PID 2620 wrote to memory of 2584 2620 iexplore.exe 30 PID 2620 wrote to memory of 2584 2620 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4ed94c3a0b416ba22f85307d2316d97_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2620 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50967b6f7b2cd01d7c5a5440b775f75a9
SHA1ff23c690273b6e53639dcff916e058b7c1444e24
SHA256aeac1c01a7fe2226cb6c1ce81d3f804785ffe8aa43d517b7fca38cc3a8251869
SHA512cc110006137cfc76fa8ceec974a49be74f37859b86b42168dca4282b91d12c1b2790b48b3e9e5d6d6f9504192450dd9bcccd46d210f4bebfe9ce1f3b39d1e385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e960674996e1c06a513676b80b0b8b5
SHA1756f634e77109f07377b4b1621a99c9ac522a96a
SHA256e3228dc6d1a92106dd7087295ad63972174f1f76b5475b5a62b73b2adda4b6b4
SHA512f5d16f8653871ac376d343b51e3837e438b72fdf864a3e3d65b93c07c36634674b0d68cce53c9cdcc81a225f65c71732df0cc7039bc40e9518e7e900c8daba6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ddf18a09d5d54a7be89be8b26267869
SHA1c446964837cb1c270926ec11ace771a7ffc484d0
SHA2560521261c806ea4bf30dd0a3751e15bc026fb6ec05d9e9eb9943ccdf82d3ab8ae
SHA5121c293b3b4ca59759677650b9d8106ffe80ce19af2033ab375f83cc21d433e27133b3c82faeabd2cde6042f93d40ce3d23550fc1a31a944e9a8d3d4839eb0d386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550129bdc6113e1165bec94cddd151288
SHA1724347efd1cd60142b9a55b9c6ca4894e2673d52
SHA256509ca6ccb54cf7807688b46b28bdd404237a10a1f61a54af1b0f38856b7d858e
SHA5121234693781f212f8d0e88fce003ebd036e919f3bb79e2f1a8bc101200485e45bc909648bdcb9f7e756b93324614e0fdaa4cd9106bf52bae1df460758494a5c08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc5a49d1cf6886d6ddabb7301b69767f
SHA1f07562e640f0f4bf487ee2e1333dd2d4a0dab569
SHA25688620ab53453a90bd57f1fb5f8922d15c402dfde690f880ed0dc3c5d30714932
SHA51218b54e64738adbb68f61eb898e00e8eb9acfe651cb38caa3e0253fa0f931a34e4a2cdf97030b90cb94e675f122971482bd21f2c50ef81a5543748a0dcb90d79a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57878978716c19a664f3d0a85143afa0e
SHA1dfa80bd076a34c31e1bf9ac6a9d71e2b3d7325ab
SHA256260e5c12dd30298c7790a7ae8388d4b4ed573e5ef4ed1d523682bd9ae9d721ec
SHA512f7f8d9344f4e3b244d0985dbd41794499bdf8a7bee90ddf588f5e003b9a18b2797356af4ede2d60feabbd2ffc044b75976b080c5259af545610582e4a96dbab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffe9e12628026952598bc082245ae782
SHA17012d2d7ece5e80a3d41c3767c2dca5ef02e9f17
SHA25602a4279c69b565837759070ead443cce680e2bd3f41fddc1acdba647869196f0
SHA5121294d8e99ac2e16c5e8e9f6d2f8fb8005814662c603cc0312f2be7bcc75102e51e83c3ea2457d4cb29b9620c0ed9f14ac0fff036c4d4a009886e5343860072c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5642163c0366920283e60faade148db6a
SHA1fc7bc3bc1579cc86f7239875994083bbe6d2ca76
SHA256aebb18464654921067f2e7961aea6ca02df5e53994d26c418c0845b0d012ede6
SHA51267695b822e91f16edfd990800b0ded09ac29f437dff11d12573b5f7441b2f59c8e089f107ef17e5698bf6240f7157517e16ccce9e9473866128d0e6762e74acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b8f87cabfbc0f3b03d8ab4b7a22b6e6
SHA1489e26cbe2511a8ac0abaf19aeab0a00d53d55f9
SHA2563a136028dd4c2240b91fdc7fb665053cc71b71de72c75934176f3f9a9b9db07d
SHA5129449e961896be483eea2e8c7f03cd8e07f5ad12828047e32558852325babd200489ed9de8e7d6e31f4a25d66c4fb3a0458ed5100ce1d4a7866d99477e567fa48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d875a03159f2bd76cf237a0fc361863
SHA1843a412db2c3c8e638f336d9a9b34f17fee5ce77
SHA256434bedfa49601c9530dc1c102d7b333af85777aa22cdb158329bc3185693376c
SHA512746dadd9e1ecdf818475eaa8795088faa67da5c480532ecc3b06ea62e3af970e94a7adac9fb944579622f116138463fc5c0a7ff01617c34bad57b6e4c84bae2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58082f720928319b11654e289e0a4ecf4
SHA1b49a5148807ea08b4fee924ecb673c7b46c0208f
SHA2565c9e3a8658e2e17aff1c6dcb637ffe29ac8ecd5941a673f2f05f26785330dc25
SHA512a4cd7d7f4cae7c9b60226020e221821b463f13ea1c121b5dc737979a7b2d720a00cb2b5e9707b655619151bbe3b079faf57eeea815a6f3200d399fd21ea1b09b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6e2cd41dd23cd1a62b9d220dfb0dbb7
SHA137eedca2e32b1060bdd4790af8dbdb027f629817
SHA2567b74dcdfca3810d6334fbd7aec80e5195555953c74763af0b2963eeedb2bc8a2
SHA512301ad7dda7355b6f5e0728ee1e03e4c49b28cb492ef33ecbf75c01688814dca797ce85e62ba2a360cb3bf9c5155be45d2f2bb7a522df31b216e3963a4f738a0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4c52fc47aba00d3e96d713f4c9e3d4c
SHA121254c322e31d7438d261a5d2bb5d30834750c4a
SHA256aaa88b573988feaf6c52b112e5e5f01119a03b3a53bbdcfb7055e9a07ae1674c
SHA51225600617f44c36d55df820d2859de7135b086bd07753303ea383973933a0906b219f0d6f089cf18e4930dc6a4ff5be366d54324591951ca53882eafc16f83b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57453448af7c58da219a1c35cbb826718
SHA1db8e6787dae11a053d41bc0746b8ba75043fa1a4
SHA25607efaff7854466933d0ddbd241aa8fcd470129ffd56955873372d7ddd6647471
SHA51240d0c26c365c6354131a2d22034b1aebdda43fa7fc28a6741df14609c6076a063af5b85deb26a753bb39af5e541f64bd2290bfbf62aafc023443108a4960e2db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2a2cc11fb918901489e21deeeb443aa
SHA1d72fa115c9fef15eaf5bc5d22883454df1096805
SHA2567ccb6fd78d92c5d617de0dee434f0d76dff143bc748aae4b4e07a8c694f00201
SHA512682b247aba53eb13afcbeeb9bb96c382487ae38b5cebf3db4d9a140fb3224a8620f0d9f4a2e1004b52c88603db5a42f44b9e6a9e177c9f6ee3c8bba33ec00b02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c901beb22d83c2dcadb30ffc008b9f4
SHA1893604b28ddaf211f1baefab7ca9faaa6a184b71
SHA2568ad36b008520bf9f25c8471e8ac2765c6c80c0f1a37306367e2817748a192520
SHA512ddeb61bb4fa288b990322b681a47df791585003e6f35df2b41c3c9b9a4cdcfbe9478e9ff9887fbc14f5497793d258535c0a9375ec73894ea271dfec5c0ac93bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549c0d434a7a7b530dc7406914e07714c
SHA1797ee407ebb58104f0864aba78f9ee16077a058b
SHA256f7b9caa3ccc52fc9e28e0f5a24658f9b48849bb60995ca0eed2b2ffb06975238
SHA512317b8efd8bb4114cf47c628fa3a792c6a12c4dee780d9a347eb96c8e0a675a86534a71c70401193963c365531b6a3b446a6a3889893de5711c9172e8eec1d40e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a18d0f8a92dca9f989d509b6caf1f36
SHA19d78d3128cf9bdbf409ea32eaf5d387188a4e152
SHA256ac4635b6df9f4568aa23513fd4705ff8940e7a805948bf54a1407c06a8ece69b
SHA51241d924cd446a94de55670b59af6d97e0235e84b9626bfb8461f8ec9ee6e18553c9441e53a6a8b3bc4a717d818df73dc1283f23daf1ee4625cb2e6e74b6eedc10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdfdb76bafac2e5802fbf45ae8b02816
SHA1c46c6fd4547cfde10135b55de9a4a5345d262855
SHA256e6906a5644bd020c0cc1999a505611ce45db9a25f0e0f7f68cef9d94d7926997
SHA512b22118993f2e16f7a2ce37d0038655eaa0a966bf15af516d044281759d7f71aaa66bbedbea2a53df18e111dee1a193bacda53d1efa80aef5372af025a5633cab
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b