Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
c96169e184b23e0962e2998029751139_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c96169e184b23e0962e2998029751139_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c96169e184b23e0962e2998029751139_JaffaCakes118.html
-
Size
43KB
-
MD5
c96169e184b23e0962e2998029751139
-
SHA1
50d05a7909e7de3a232e6eda452effbf0364ec18
-
SHA256
b5ef904959a94a7b927791ca6c0b76cb492f8d2222dac4598a0454015aaca654
-
SHA512
44a1eae73e7d64d6e923cebd73f4f42bd5d55bf2804ad40ed8dd124a7f99dbc2edded956964c52989f670c1ec2c04d860d4ba2ac5171d8a33e352bd5b1fbaba5
-
SSDEEP
768:S+jcq2qJqET5oRGIc+Vw1VvbNtLOrfAgRFj:S+jcq2qJQDLiTD/iz3RFj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000e99e5fbd59585f6b083be924562b2a479b1f98d17d80ede6891d637a5091d58e000000000e8000000002000020000000ee8e597a615261e10f59e89535ecdde0afba811866f6eede92abf6d59f91693b2000000071752eed21327fa31f947883eca8147fda3a9ce52ad8caf26535d00dd02d3f2b4000000010c0359f5fdf214ed1f80a11f3a463033f8b5302a874544d4a5b36696b928001fe812b9b940e65a93f35ef8659321b83e78867d63329d235cbb5b0afbd8721b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{914111E1-6634-11EF-8705-5AE8573B0ABD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431118012" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0317d6641fada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2748 2188 iexplore.exe 30 PID 2188 wrote to memory of 2748 2188 iexplore.exe 30 PID 2188 wrote to memory of 2748 2188 iexplore.exe 30 PID 2188 wrote to memory of 2748 2188 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c96169e184b23e0962e2998029751139_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b77afe80bd065cdb761d51ab982f2292
SHA101216605a968d27f015327f7753758d9ec03324c
SHA25605c471fa199c9f5dd06f77d3e83812d0a78e459b7409a042b2712ace81d46502
SHA51297294eb8d77fac242bdc0c5a2343c143ac0302d5e7fa1ab11a935e279279edf5ca34364d43239c3afb6419d922e1deb64844919df201c56192d28284a3b2cc3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599115821aedb74d4bd8cfa2844ae4868
SHA187df36e22958f3f4d8b23224b68b55c6f93523b4
SHA2564acfcc4eb9b44048801d422de1f1a34ad04ec0dc97349565890a047ce04f5789
SHA512184212add11a4c115dcca3d89ef2e8366c3ef71bd739f18544bf8daf5aa9a0a71a636bb4ee4b4425e5f25fe43394ba5706d16b2612c240f1ea4d5ea57381ea6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ce2766fa7393c58842bab1c21bb3a3
SHA1c843ff41326133baa7fb4879764c9fddbe252906
SHA2560b1ae22063f197ffa2a5f7dfaf0e968e928a88586fa6c58368b0189622397a23
SHA5127aa970d2f6e1ccc6aed9bd919e3ed0535bada6260b72ad4c15cdc38e823840f7e6109a6bc6d7682b5c114ab787ffefc689d1daae5282fb9c8187e0e9d43e5a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f170c5f84f926af0cb70d401dbfa2e8
SHA197b6079edaa773efa4c7d4b75e17fa26c1fad53a
SHA256247c4244d70938117dfe6b56b7b5896b8c6fa261ef91070d40c49491ef50920b
SHA51294e13312592ac8ac8ca78211838e40ce3fc1cf385759c228962b6431238e2526c63fc24cc1f27a41544fde60cef3a7ba85ee866d004c187efcccff797716c83d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a707e4ff6b0aa09ff2bf12ff2862a5e
SHA18d7d31c8d3e1032eb639bdf7751c0c120e712bfd
SHA2563eacc4b83fff9ab0a5ad3973f55ba78810659d344cdc4ac25cbb7f785b404a71
SHA5123f56ce50a761fbd352c9dd6742f751f8691fbcbd2313096c2adfe3f536f6381e85cb0ceadca6b54a914f190d49489622519b07a7a5f3343eb64bbd9f99e2364d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5009a94304cec8de7a8f41b2c082cc46d
SHA1a3748eeed214b928ed3f29d2fef9ad17119f73c3
SHA256682558007b5af5249a7a9c68eb22c1e2872d0e88f56d4daeab66e5f4019489d8
SHA512c1746932e8aa0235e178e350f8e794fe19d25ee64196d603f2c7101373ef3765919d6282198953e52aba93baa8ba9a67a754995e5e6e3f64f75736f5638500fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c98f0f7b09f9a9f3a47a2e769483b7a0
SHA1b1d1b9787b0d6517a8613c3fd3b5f0f98875e6a9
SHA256853e9b863e8ffb8f955d7b0a95039614761275dd39c821d99be130ef86bba178
SHA5122cec122b23f36c68a1b07fd9f1392f70c71f27199ac2192485ebf290b643cd230b9560eef9c41b91cf317222d9a00b284e2e7025f45bf83c5fd393f6b6950444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5660f5076411b147dbaf33e81165b842f
SHA11eb70d91b8115408c218d14aa59d973c7c169b35
SHA2563ba46320d248445d4af1a08a2f244655ddfb13a8ea93b5a35246e17936706eb3
SHA512780f3c10cd7c410c2e9da1529c7d01b51c3023ef36443af4a06ef799402ba59840f19bff51f343c4ff9c13b2df077707d509a9ac7444a37a5b57fe6f907debb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8f4663e43494c57cf1e8d8b82ccdf56
SHA12c983e9954ae3cf352d44a6c66523fa3ffb8e548
SHA25694e1cbb6586e8331f7814bcdbc5a5eb932796a119e0d76c5314bb371a1fcb7b2
SHA5120c705c598d80a1c4949fcf0ec4e393c6429784940b6ec5ffae20b18eb2337982b815318328102cab997132f4c6ed52042c5b6f256d37ea830b4132717020aabe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a206856662a83cf0390cd535db01ccb2
SHA1a79123d775ae2183f35322eb0cb0fe387ed44314
SHA2566eba77cd91d71639a465d74f27dcae2859050a65d5b6285e32a2995eec0dac0e
SHA5129b459fa1b5bf32d84fd1dc307fde015154b1d4cc5efc813adec719b9449f228ca3162c5607a984d1898d1968b0975bc023e89bceb23e98b38bda3cb387d37a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50659da5da38ade8496153ecf4c2bb590
SHA184c1645f1df2d99c21241ffa4fce3c67597247ec
SHA2566e289c39f5be2f7bb58838da282c4c55696a78f83027d7f50ffc476468854cf8
SHA51215066f0a7b81872289cc7294f20f97959d19b009a78144634c9e4945bababffa2d35648537a9f7236f2a3451029c910bae5d8a28f634398060dc87a5b629aea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5980c5ad05b6fa64dca78378734d735f8
SHA142e4e81ea054d04032ee6ace8ca54edbe982900a
SHA25695c8b06f60be16bb3e4873374c35e8d028d9154a2a01618491be077266e20e2f
SHA512a565c7e94fe8c7eeb9a3f43d555f14f6fceb8b4f1d7189060ea9b2ab702e25b8b78aa9497e4a6ef048f3fd76398a4601d1a50c437973da5e345e93038a8b02b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591e338fb94170236ec11559c2cdd68e5
SHA1bb3f8709c4059d724e85bb5154e6f6321364f76b
SHA2563e8acd42b57357bf67bbaca4b5886421919928856978cde6b96dcd3fa7f678f8
SHA512407aa628195af60bb5318f344778bffe44be13cab30b1a20ae585cb6e06a431e88a7fff5ce31dbda95975918a0ce68f3b8251256b109554ae123ea06cf614a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc1e42dc1384bdf049ca7331851d536f
SHA1fbf9ea23e584b009af2b12d1afb64b45f0c2ec17
SHA25622ea4ec55fccfb54cb8d04bff48365398376adc812ca2c8464add64be805ee4a
SHA512a78adeef022d11bc6b8279e3b2ba6119c606a855e1cc00718465cc385d953906c2484123786b27ebcc26f7f6e8532b712a46a88348e67f2408fec20f294b8120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a793781828730c5327091e0e8489eb3e
SHA1f1466dbf678122bf72a40544743fdd01141ae348
SHA256aaa830bf02c62cd6be387619424b725e890dcba4ffcc632200fe1ba96c613bce
SHA512fe1831a4edd11545df5b3491c8e7434a8d1112499deca93171715dcc09ed90d9a94d40c2d5bc71cfb3440413409b9774e03beffa3bbfcda15a217df91d558361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58034178a5d0b34e01a54935dae3cf992
SHA12dc4934b0d80b1adf502adcd36924458409ba8af
SHA2564321705ba464fd6d0f5364f37c17a81acb507a7b30d99878028c63ecbd963a23
SHA512b453d7ac0e0ec6dfc20e588bd17f0958a5fd5706d8992fa8a8fe1468bbe35176d2da0595f157a2fb18528a434e28cdb5ba6d0e9ac2ddd640e50dcf5044e527a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5089c40cd48e3002e97353572b28dbecd
SHA1cc2a0ee218fdb12eb39b6565b0ed063109dd24ab
SHA256bb79f3c793e66f2e2fa9b6d19af8858734a099a071f4f0b253b3194203405b44
SHA51296847b1a43dfc807cf9246b203408e66bf30d8d1449fd2e8911877ef00933b554eab2a20f22e87a9425b18461f75d39d2509bbdcb4dda0e6d2c4453967555c3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e540b0f72d4161b3be96e7852506f48
SHA1f728e9f8e4eac7f01e828b2ed82559a912abd84e
SHA256015b8e4d69c510d67382817747b9d7fcf29f46acccab08f8f0102033d180c81f
SHA5124e19efbf23cd5db2ba1fc746ea1757cc9963ff2ac9cc6a742d8613a89e3b25d8f9474be66fa69cbe9f7659eae01a498769c0feab256f6e51291effa20d71478e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d31671fd51a00a3aa59f6ffd54747fdd
SHA177b76cc6b889557ed450dd9631815282e9afbed5
SHA25613956759aa7031ad5e59335410308b7f86c27ede060bcbfcc9ba92ba5ad2ea1a
SHA51277d4df09a555bbf899d207d78b38b6cc2e691a817b1c59a728c5e7150042f48d2d67985d79c285e40a1b98beb9060b3b2d0fef9f87e537a5f42eb72139b32eb5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b