Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 10:15
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5128ec40351cda48b2aab8600f2da460.html
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_5128ec40351cda48b2aab8600f2da460.html
-
Size
12KB
-
MD5
5128ec40351cda48b2aab8600f2da460
-
SHA1
1a079e568dfd5c4b4b03ca8cd8cab21e11c66dbf
-
SHA256
68d594e457e6434de578a9226cda34da3cdbec4707bf09524509b8b1d826cad8
-
SHA512
b38486ad73b170819f9b02d61b2c4897d9af60f4882ac9ac282622a7fb1521e6a0900dc7cddaef04817167c9715a8f9bdc17d5b8f959aa89c0fb6abd31c17417
-
SSDEEP
384:BQz+SCuPbld6rTyv6Rb+nQKrlibQmYMH/pMF1E:uzcuTgyvCAdhi8yfpe1E
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c01fa33a365cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{630AA0F1-C829-11EF-854E-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d2aec9fa09f2d64cbd6d0de7189df5b200000000020000000000106600000001000020000000783474a5892c828e0fb615520f16e41533a651676f5db48ed10f4e6b5821dd0c000000000e800000000200002000000050b0c38d5f6648e6eefb3510c32eb267a1e9d7e68aced0f563fc17dd8b5468772000000088a30129da47fd9cec3363ad0848d7e89c40beb268763f6049a080b7046d925e40000000305ed9f350e2b8f936599d9126ab2ab31f07dbe5e8333754ace5673b8e0fb28f3468e3eed242133bfe99a1d957fb2c96851cf2b872864f4c659be7d417fa610e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441888423" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2636 2512 iexplore.exe 31 PID 2512 wrote to memory of 2636 2512 iexplore.exe 31 PID 2512 wrote to memory of 2636 2512 iexplore.exe 31 PID 2512 wrote to memory of 2636 2512 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5128ec40351cda48b2aab8600f2da460.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdbbe3b931d45882ca9572dded014979
SHA1ed91c876befa11ec2e96b91d5876b65dc58d46dc
SHA25600045b7dd9cebe564b166a034617edc7818c35071750ea808a6c62ca320e6f64
SHA512c12ef21a27d4ffe73f4c254ea74983671a978b87827ee65de8a9b1e642e799a54025ada6d2c12ab99da25227441bf2cbb263f769d73844b90b681bc534604071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c013a603e7e0bbce911a3aaae98e467
SHA132c97d05e7e5c909cb00efe3c8a7021a6afaf988
SHA256408cb31772ea747eefbf39698b9545acb7fb03f7671086990e5199036ec2a164
SHA5121d54ed853e781dd1895865513e771818489b7fae4b51019cc4f7ffedacb7341a16f41eaa958edd8d82eff81c30f1ef2a4098a45322f36c5e59584e48e038eb1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592ac42a5b395f7852289c786e7cc9041
SHA1e3d561a93adb5f60213a5e27d1c3ea1cdbb11a80
SHA2561f0d8a67ae3bd8b3a824162ebdf5b86d1d9bad15dc8cddc8522c4c7a781be874
SHA512d61a82ac59d0755d06cd5b126d133f3a98080188722d81cdadbc98985bef72132a12e66300483bc85dcc81c5ec115fa7ff4b7ef1972f6dde6c7f2813a62581d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b519c2d20071f0bba53b4a55a8241d95
SHA1b1b61f28d35da5cac230c42335f1b9422bcd4c3c
SHA2568566d285d949b3f1d08ad656590dae4b4afaef773224696f0f903bc1b3d73409
SHA5125aaf67fd65352e6d29c4a06417ff2b8b1f335822a16fa254a4e3db44b82efeb2c5b7a2aaf03f29772cc8ea3423003011a59f61b4c1fe08460b583b9b52153cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5face070cdff9233b02e05ce4fa495a05
SHA1b2651bd0870850d10c71633798cd7ea78efe2f96
SHA256037b0c8c2e462bcb53da8109353c7e66f4bd1f4aef69df821d55807d296f3a97
SHA51281a27756aaa18ea3829d890c821602c00376d0b3bbc69d5ef3df3d6105cbbe977df8e255ce4378d5c35b627281adb54254f18d50864f7907034e3256239b43ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ccb17490682e8b4484004af07a14a1
SHA13169a2d1cf84fed6af909b3e3fc25d179078213f
SHA256f8a82742d530447997b92bb966f0ddae1176bf510af36dafaa8541bf787efc60
SHA5121051356ff0cbc3be7a9e11aa5b01e6d4cb1a343c74b6cc85a6459c272bd16683c9ab2f8877b1a1ed706460eda0d898322505af8e0e001cdf4fcd8601f489d0bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531e14e19d1dbfccda9320a87df86ac30
SHA149d14cf754fee602ca066ec24f60e5d8443e5cd6
SHA2563b16f030baf4ae23110948e686f6cbf6b1807aad2af3d208ac10daa753d7b802
SHA5122a877a85bfbb66b89927a0e8b5952604a1767bd298fac699f7424a6e7dee9942b5b8fb271904b811d24375d9be7f59edcc81b60b01445bff0731fe60f6d6da16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f2968b55369c5c5dabe1f7682e4f50d
SHA16654e34e74f2c26b2de121c586fb66349df8c0ef
SHA2563e2ff85654c18c94bc7b9a38b5ff7cd68ac48b719d8c3a668a627a19a42a46d7
SHA51290cd99890650ad70e8a7532e86c93a8d48371ea5da5dfc116a358b118564fc02fcc4330d4d281d39ced95a0fe847bda0a1df4fbbb5c5b6a0df4440571c793ec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569c4c9ac786fbb921c5b3d7e33fecb11
SHA14f3694771a5939feaedf87668b7fde6ae1a06a57
SHA256453248f6e0480e95caa0a9c16c7097df1c4c53883139d0a894543c9b4963485d
SHA512038027fc5895b07887c6305d794f8f065e37b51093320b3db55ec55177738187a16b0dfea1195bbecbf41b2f70f569dd11eaed5e20f0746ea476b110a8e36db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5670c0ab1a227858d35941dec529352
SHA1fcb4e63b3709d2f354aba3610ccfa9cd3fd5c2f5
SHA25696df046439620f5f2138dc03e845f69b4d28981497b6f98d3f6d00d1f70ce85d
SHA5121d2fafbc18aaecf25dd228c49c1a74b73df4ed0d7260bbac657834b99fbff74983c82e978fa84ba49f0a4f242262f1e8c379907d875b202c3889d7d99b0b33b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba98b5b67e2316e1f46d48f20b8d9f76
SHA14e53ac69875c2646234cbb28d1ffe45d9f660b55
SHA256db2577b84304611ae438d1c02a007dd14186371bbb45014e4e7b96888a65a6af
SHA5126bab892525259e1c3921aa25eb461622f4f4e46d44ea6b46f1db03b47a0ee46d3798608e8f5524b171443a0eb793dd8e1afe0071db08bb8a8410870682f33f8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d36f771abdc143d4ff007386a5d5e95
SHA1a2221f28d18875f829e8beb385ff102806b9b7e5
SHA256b1dd4c53cbfa0e40e51ab2391ae67ef861e795c236b0e690bfb55feb03b15c1e
SHA512b922995a026f098f403154866ce022c64ff6679bda8b048e0755e43f010761408d5c0f86e8a37cdc1b211e67accbb63d0ff21f1dbc4826337bdd97f802c00b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555f0232521cae25e5ff0f98016f3f3a2
SHA1eddf16a3267f357f0d601cf631dbae70c199f5a8
SHA256d78228e4d1de0aec9ea62b1f520157709cfdcc684e290218914665546a7d3eaf
SHA512d56f311b6db0c94bbc3b9e48578d588be7b3937f7b54efc2744365b72debafc64131c26f8a44baf13d1f2bfab02e964d067af2bb9786bd24a87a387f9de4a180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b5d274612017ddb406ba61ac80d6bf1
SHA16ad5289ac7fece6684529a5d44f2b3f83ab1e632
SHA256a063b3fb0d5caca28862286fc9ecfa545e4055de9e0efa37671cf62ee565c5ce
SHA51238a4ae49051e91bf95fc7111548087016a1b8f106efad779952c8d952052a4591371838d89c5e84c260f247013a43110e092a33c4d50ed1cd640ec0c5a6b722c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7ef4eceb7d20dd694053bb29f067928
SHA17dff85800cb9f78df54fc496997f6ad5822aa0bc
SHA2568004c149dc63af17c1cc944622cf9d8b7d653f3f260a7e779d52971012f732e7
SHA512c8d410bf37838ab82a0d512746917eef20ceafd6d8d7dacaac7844a1bb880ce8903ca586824db81d630c4127961f4acd19afc689a7ac12402d196cbf2328ae10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5694f00be7edbb65fcb15b7def0a94861
SHA16769a84f6ea3871cda746f08bf82b198eebf2b27
SHA25669674b376b2296a2488d7e15e76b15d846f76655689d5ab51296be960d5dc0e0
SHA5127ba323abe6c5db0c75614c0a6303a7a33684648ff31ca759d3b6680d3945b80b26a6d250ea71682e2c4c7141ee86ad1fc4bf4b6b54459a23ce12d7bf40420d67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514349bd2d6d44371067d2d9f5f32b3d9
SHA17336b6ef3eca6e96797d361157817290e0b356f2
SHA256bf3997b0f167ec25d8deabef904b5b491e3719a35f20b32d46b7621e06b8479d
SHA512394b53203bcfc634eaba3717443cb0fddcda6c017e1537e37b119331943d6928d497c92f36e84a95e2e4a7cac7c60d5e246de7e7e63eeb92d99f37e05eaa2529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bde6bc01191cc01c7970f1b631648e1c
SHA1ae2f71433f4dd1cdca7f2d5f1da58d2ab77b8ba0
SHA25606f8b1645d634066e62ce07551ed1b4bb6dc4e0c93aa4c00f2ad4c2f89616643
SHA51212d5dc496837b3e6e273e07067b81c0aee1b3afb3d3f466d2c6e80bc3a93f333817b6a60b87235e49876c8b0cc985b2c85e7547f90b54ca8ca06eed142bb811f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bddc948b22921f0af2ddc841ff0278d
SHA1f9c2600bb62724cd5eeaacbda11af0a300a324f3
SHA256af6e4e5f15077cb39882f12fca3a1a1e39910830e685df5d9927d74c5efe623f
SHA5125b47d36459c6c2012597a5f80bf287bfc8bb33d9b69d436badbb8af67608d2aeef7b5b97f4dc614beaf2ff764b353c1b3b8cfbeb3252392d9d8408c43bd0f7e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5847395956619ed2dbe207eb70720c2a6
SHA1ea6efbe5c74eb4985766d0465705d1a977c33f2b
SHA256efc10a709c8ce739b5a753d493ba0f595de832e545214a8da6a51cd027dddb65
SHA5125ee87f759739653baac635b44e92ffd3cccb4b75777407c12f7bd8665ed17373c321e40c56b5047366be64998a81813b1d6cbfed71ce7f9a5c165905960fefa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d622a8535a6251dfd486aaf2442c44
SHA1400fc5659a25b72a564a4629bb021bb36269ad7e
SHA2561d687f41eba8e38ee4fd31593afa41ac417856416850922b43331a475e1fbc91
SHA51216d20090ca467ff544f8cbcf94df91603466531e8df3d331c3899687300155dc8935d9543d575c58792b4eada77d335bc6940885d26ed2fe05fc2c7e57e692b6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b