Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
b1b88d8bc42e27b2661da7ebc5179a1a_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b1b88d8bc42e27b2661da7ebc5179a1a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b1b88d8bc42e27b2661da7ebc5179a1a_JaffaCakes118.html
-
Size
82KB
-
MD5
b1b88d8bc42e27b2661da7ebc5179a1a
-
SHA1
eb8d0b050ef0d3cadad8ed7900f419a1b45c4628
-
SHA256
4273610b8d3016bd0b4e0190725779f431154e2b8f40ca7eb2500b040d965951
-
SHA512
eb9fad424f33a76b44c2879f175555d8d535791a228f6bf8bf96cacf06181740ef80443db0af14dc5e881e4c9fe8a164d9a94a53e32ff72c1b979439efc398b8
-
SSDEEP
768:7lkSgOriWNQuavoBgGjUvGOqeTY9SjnpV6GiHcQxflIjY4QG8vHcNXs1298oE:Ka9UuOqNHZs8vHoXs/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40981288a5bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000006201611aa555440904268d0d97e1a514ad44d336370564d8cad60552daf74197000000000e800000000200002000000045ccb243a422a0a55e06d1ca5e6d43f05cd9691211c7877caeeab818ebedce992000000057d295b99999267f7832b6097c888583c79a1b8269933300d4e36d9b7fb282d440000000bd00dbc66779c05d3c078170db68d7e92c17f077788d2785eb5a8d5c3bd028f15465ec7418a2643fd59d651ba37e6a9903a157dee8de07f41ec33663e7e358a5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424673896" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0A3E0C1-2B98-11EF-8144-CE80800B5EC6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2100 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1252 iexplore.exe 1252 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2100 1252 iexplore.exe 28 PID 1252 wrote to memory of 2100 1252 iexplore.exe 28 PID 1252 wrote to memory of 2100 1252 iexplore.exe 28 PID 1252 wrote to memory of 2100 1252 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b1b88d8bc42e27b2661da7ebc5179a1a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5303437fbd31b4cf058bd94f678f9f4a9
SHA1015dee4bce639a28228d166b9bdf46e9a2977c49
SHA2563645835197436cec2286af705339c7ef5ac5a42aa2e602a8072cef842de2c90e
SHA512ac03dae9e2d2dbbf03f0857b044d8b4901b999085baf3d48726d641fb86498d002bc034deb7acf32577e9071817858e211a5f37b418d50bb2f8009bf913d309f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56642bdf3fb97a6dd5151915b4c9a0a3b
SHA1e21b44c9960e1ed0cf398b276417a181a016cd2e
SHA2560d1f5189b57594a19f2f2d324a7ee0c8595cf1ce38e7bf833ae4d03b8ee3fb1d
SHA5127419e1a68460a75b4065910492d57959dd02cc1ffa37a29c9f0d20a133eed9c56ea05f39548bb9ddbfc7c813b0d7cad7f697eb1eaf4c181d53fe0838b4c3b928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0833b47dbdf961888ecef808b814d9e
SHA10516a76d06c0515b140481baa06806d54695ed32
SHA256b80b1e97732719c32e4f2090a1f15a7db494638763b92ac77382c3c30406d694
SHA512d4e51f67d0e408e8b12af00f12c695e8484c728140cb3d62ee7fd757a1045f4d1005fcccebd422dd19adb29df36329f66f95c56d14ff7613cf26f71880ac6e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f5222a084f171099f878af12c143d14
SHA12df941d2a04295b3ce07d04366cfa62df295e59b
SHA256da63f37468c42e5fb7ede427eacd8af99236ddb0a05e56a04c6c20502bd9e80b
SHA5126b25cd528ee3653ff11d32aea337576d80e48da67c4e5748c8d0211e313265d5370446e2739c59a40c286f5183d1d0157436f2b9f9781432b29c67342c0fed83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d1471613c0ffb419405ed63db04ab31
SHA1bd361eee498e741cd4c2061124989d89e2ffdaec
SHA256dbdd8bf38e5792ab46ec2520055523a6622aa67ad125047dc4968250632e2b28
SHA5124d41f22f9931689149cd1762cf0f00532f24c8a9c14b2838e820cd822126a4cacb0f7986cf5767d2a80d3207ffc70e3a91db22a82a8bb34b9d7f6f56ffbe01fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cadaaefb030bc10624db74b330f6a1a1
SHA1818f8b56723d2c4856776a03ae18ed8d6dfe52b3
SHA256bfe601eaf750a2dca64aebfab24c2946c9c1b95287666a7b8994838b328de21f
SHA512d473e271ef64418f82972c70c2fc6187ccf27d9297895748e66c120e1deedb3eacb881f4a4b027f8e83945fbcc8c792b28d14d8cf07219efd2237ca6ba14aa6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d898cc560cf59f73191917670f3ad2a
SHA1fb788a0b28bf0bad86744dd3668cdc0d37d0323d
SHA256ba4a2040836265e7f0d0e5b4df135f1bc18a0b62c82ea768214c656158f9f964
SHA5121a3be151a798e30f455168210c11787b308bf01bd0fa372e58ca7a405c78f29daba6f0b953ea266c2caf334b5bf51facba54ddb4a692e8bdf7d37508739b0e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530c49089854ce2c69e25afadcdac8fa0
SHA17bc3d628a5bbe6e3b7e7e8593f14403a90eaa538
SHA2564efd2079025e3aaf69d733955bbef97c13f9a54c237afd7015de06795fffe176
SHA512d0073c3a1c58e0e6e0ab0a359a7a62b97fa2e39c810ec001faf134e92aaff56b30f62d65f2a9f1cbd0e20e8bd4935f741de7aa30e04e376947fdc3d5e9af663c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1ffb07653431e2bf2c8442205beb5c7
SHA1e0860873128e6fe613f481d88bbc13c03aedb65b
SHA256e223bcbfb96e3e74228009fe62eabe02d696924543a9ceffbdde255e7bfbb88e
SHA5127b2c61d9ed79084b099218f559c006b452686480aac1702a62de7e29873a8da8d62f571cc62640ea324e58db3a7d74d30ac4ff51fc5f840818fd65ae4a9e7e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550052d0767df1d5a790ebba8e12a137f
SHA10b24d4cff594a976bffe40715a017b3e2e0740fc
SHA256906578b80c99f863cf67faa2fa945c6785d3c3fd2311a116a3da182f0ca5cb16
SHA512b28ad98ae68984944d3b1fe4777975cb663380e875d4e5227c27e38dd4a626f585122a41e1dadd63ecb209c1efcf1534d61db217e3ea07eb5b3ba17e7d23c553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aef643259e74a6b28fcef9427772e66f
SHA108207ac0ea656d87d2187362be94a5be7d461f6c
SHA2563102fdcea8e732869a07600e0c7ce8d44cb10193d5bfe02f2d811e3a8099164f
SHA5121df32aed9f9b6ad065890c4a9a17e1f678b0c88847be13115afb7d026b8685f7aa55911ed8767632cca54ff9760da6dcab03b69772d686c8154cf17d8da38f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6929ef6ea1e90629d46439f9196a3d6
SHA1c1adb55d7d8e93348a86fe8e1ea77f0e16bf9bf7
SHA2568b1ccb547354758a19f062dace5ecd4409cb2f7fbbf73a62b047a532dd0806fb
SHA5128f44d490d3032befd118200d87849ca21f01d4bab6140bce153992e8f5d6dd75f127441ab9c52e2ec83444221bd7ebe1c30932e6227248deea229f98d43a696d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573f23de79a69131fc34497469c5300e4
SHA1232b2e535271fdbf1de3eb18f2b3ca4b72ce8404
SHA256826a95d1d6499203e49d97fe4dd35d41b53c5ea483d31a86d6327351736c4866
SHA512b72c03046a05b1797f279bd47b6aae04756cc2f2091e066403ce4b26edfafc3f222ec9a86e9f3972061d2a5d30163e015ddcae21978538170aee5f5b814ba126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5527635fcb54edec4a1c8ca133061fe54
SHA12e3b8778377a24da8063fb4c13619ab4c357833e
SHA2561af3b16b71d950e5d113a51cfc7f9284e40fa448d3114a2dc8eca75fb851f2be
SHA51257c1992d4b3588654935e806b2d1c6f545d94d3ca02632080335c392e68834ffa8fe9543e409750cd958f8e09b40cf42f9fb8bfbea44c4980c3bfe0cf073bd2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5302caa9d31e5bf95b4ea7b6797b473e5
SHA1d0101504da82dc302c5be63f2c8cf988f23f97f9
SHA2568748a7df713271a4b7d6ef43ba934a5e81fe83e7fcab1e8599679babca680e16
SHA5126a60f68de20423e3af42e29ac2e2540c45d3f372c11896c415b97611474e8860920c929fb5d267eaafb625e5e921bfc0d6e8966af54779180288e5d6d6da7b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50417568b4a9f12a99b8374e522e7c7f1
SHA12bc6e878dc53c7a802d0d994a57137d48ecc7709
SHA256e9173f6fd06f209e9c872b275e16dcd18c7b078c5c51d0fdd0358619a1d464ca
SHA512a8a06441ece097d0f484ce2db363859b145fe53f593b35332e6d3c47751c391729b0cd83b0a717a75db3d51842d5b03bd64b50e46bbb3475f2da7de9f08b3912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f52468dafce5d7f4647acfd40b6f05e
SHA150da84456603aa3c91f1077fa8c50f84750c02ee
SHA256663781d5f01dd854b99ccd589f5c4823e1c3a84b13cc93432cf3c10c41d4811a
SHA51295c25221c280122397f2ce69b06bb5e3d87b78646a08bb7b0e8338c8b672550f4100b7c72625d75a867ba564109dbf31fc026a5691e3d5e93af625fc9f0e8602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f5964bb09cab67605df8b5b537deeb
SHA11b5614d06046e2167a8d398b4d194c1934f59cf1
SHA25641e16e6672230f859733f0abe06933c81297f3111b6f3a2d6e96bcf735fb1843
SHA5127178aa9469f87db6dbf644913057277ae4f71b1028d24ec2845875657f56928d948a3988bcd8945cb0f26ba5545a38b9cf68ce608f12e2b49f0a782bac93591f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1351349cf3741d037a3e0eeb0c916c4
SHA1893ec1d1735e56aa57c5251951bbaa61daa409e3
SHA256addebe61b24981185d476151f752cb767f1b6747eb9a7b6b549d546bb3a0d360
SHA512830b445a4384f7dee4a0f902179f25d43a1a9922a7126b09d619db4910b2dabd548fcc6e752e5ab47870a18a92171ec539328a73c62abe8e7ac221f4450db352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b6aec0397234cd53c57492aa0fc6a2d
SHA17507fad1cb52c2695e4e4215891bf748e50b8456
SHA256f49da15910519b3d674131edd194aa9edae9706732765ef464e567b85e908a80
SHA512c7dcab2dff7fdd987046fb250247e8e4eee754ec8e5eb7b7b3bc8dfc4da7e8e55bf8a39881188c73c569c384579fd86e3bd617594b80a1000dbd0b44846af0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5139c233e93fbe2a464632334246a8704
SHA10b892bfaf6d0c00acd2fd1fb6c212ca0e2f67193
SHA256c47f17abed65eac899ab3361085b76dcc26e43b14c4d6625c492d9ccfe840537
SHA51297d7b65cd72a37350d1dce426363c8d9a2588aff5851e79d7e2e4e6d6c71d1fd26e7ce50d66189cee19413311f966b5fcfcb86f1ca04bed3a0ad265be87d969e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b