Analysis
-
max time kernel
78s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
d1926256aa071cf7829c7f3878706107_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1926256aa071cf7829c7f3878706107_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1926256aa071cf7829c7f3878706107_JaffaCakes118.html
-
Size
42KB
-
MD5
d1926256aa071cf7829c7f3878706107
-
SHA1
6059bd4b30c78f17823b359d6240e9a83ea66c00
-
SHA256
a6d23924f06c092afdfb902326a5f73c0fabe12ea63213a15e0337a23226f985
-
SHA512
f5aeb1aa90307485b42ed9593a350d6e6fd167fbed11ed3947f619ca983174a09738631c33433bd1ab63b25237af7f046a15e61047f357244988937fa7482959
-
SSDEEP
192:uw/Eb5nR2PfnQjxn5Q/NnQiegNncnQOkEntX/nQTbnxnQmSMxIBiaXvP3bQGzTPO:EQ/Rnx8iWdz0PvrqCYjh3dsbf5ZARDo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b02cca020501db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431861732" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2D799271-6CF8-11EF-968D-EE9D5ADBD8E3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000031e6e3ae8913639d97831550fa97e98f3cdbf017a549379faf2fd0012be09f37000000000e8000000002000020000000943d95b787384d830c825985711eda6a35965859b8a962e2e7e2c93aeda34331200000002fd91ccebc28471ee52453345fec16b444946c58adf5f73b1d669a61fa0cc94a400000003c918ad130f367fbd0b8d9113efa939fca5a00e1e9885578823de62c4f7263fc1935df0060d64fff84b6df9960de42f8e7b4aa31da5b33dd4b86b8eef14ee2d7 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 320 iexplore.exe 320 iexplore.exe 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 320 wrote to memory of 2228 320 iexplore.exe 30 PID 320 wrote to memory of 2228 320 iexplore.exe 30 PID 320 wrote to memory of 2228 320 iexplore.exe 30 PID 320 wrote to memory of 2228 320 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1926256aa071cf7829c7f3878706107_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:320 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceaf871419f69b93e7f5ca423829cecb
SHA17e02d16d3f1ca8bfe15186500fa9e36cf6b26201
SHA2560656e02c50152a4fec58d72f0cb261acce58dc98f1dce75abeb06f5d866ce362
SHA5127469148f27365ea47246fbca2e10db2da12993560ec85fdd10922ebea00bccfca5d5af4f1d311faf5f15ebcbd2ac6c4fd5ea1debca8f4d39271174341463e531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df5e638bbc2c5dc340c0d1ad246772af
SHA165d8cf2f4ab5ef0cda8a26669e42b47a1797d3a6
SHA256125673f87e45780f61cab21d11824f3cf512ac1da3a3eff6a9ae1a1b0882ef93
SHA512fa71caf0c4db8e090685aaf7da4a685d8cfb3d5f7dce846da7c8a40233a55815b96ae5df896a0607b6f02952ee3b22bf08f0cedeb1e1c67ca87a566e1905c94c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d608f50f41287413d13762fac572d81
SHA16e20fe9b92ddc8644c81b9f83f409c1cb0a0012e
SHA2563b09c5674c61fd7a9278298e0476ab0d410853165d06f17331bc12714c0110fa
SHA51209d343dfded6418196ad3d1700c0854174a23aca3f23a222fb9170b6ac7d728ccf96afe5dbe6ec51cfbde2ee8df33b728e218dd96d2b7dac29d86d51e2c95014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef2730f6bee1e87e81c986545730ad6b
SHA1f1b57f6bd11327e0b3c21570653a2a96d4730b1a
SHA256e4fc1f97b10069fd284b70010f49d179e6ff08ff0c6261a0004d3a3d39952031
SHA512ccf868b0ee71af3421fb17b22c027aab248a4e6fb15828ff11ec16b8b0e473430556ca6a9e93872ae5a7b4cf4652d8b90408ba6e3665b2159ae875579cb64ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5121e2b308a77028ba410a0f9928a3183
SHA1873dba8a90f9009a8d0f813db57a7c70a197caff
SHA2562d5bcb723ebbdb2f0b3288f4f1290c48800ed5a058a888d1150b076ef29fd33e
SHA5129848f293bc45c68c013ee4ff849e4ab7425aeb8ec8317a8ff701979696c6f63e968ada1f9952db1e25f547722f347feaad209b398d4afeafd088914b5946e291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5286834783e195b1ccebf5e536ce186d3
SHA1959c2eaf35c8b30e8615ea5de8e0ee3bf13fbf76
SHA2566c84bbe9b7d4ed8274d5f73bad43511b4b6beb8c6ebc56ab155db40b7f3bb057
SHA51255f2c6a4f4e9aa89c3eaf29f56ef5ee79bb792f34d09cd986306439d4e63ab16f7881b4c4e4324cd197040de3de373daee2384a2ab415f6d3740e45cf1752b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51960321e61b0492e8eb3b65456b570e5
SHA1ea5f13c893ad5a4ff1ce23e7bf18439cd116fee0
SHA25639b24867ff0180dc8176002debe9fef4be101a6b9c373951fe7c989399f78ec1
SHA512ba7957328c79b9f79b616ebbdb7cf892d35a4bb11b3f829a74b06bbeba7fcffafc8a2a7047f538e0360443848e1353586f811387ff9af5575aa7d8e85ff6cc80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596fc4dd5fa3ff825e96387ef80f8c128
SHA101f33b932c0fae47334f76def6fab9384b102953
SHA2565f595d78859a5ee1026aa9f3e685c2be39c1fa5ceeafea849cd136ea2bda7f9d
SHA512a671f0f4917290bb26a2bf66385e29ca8118250dce018c223eb44e9e814d605c75c338943c41d879e367d4dab71d154175e915f94480d3a0fd89bf7b62b82347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58172f4b96ba76b37055aac479cf8f108
SHA1da20f7fa01ab9c455bcc82ff68ae8da101bee8fd
SHA2566a081343c3147f1c118bca3900c69b0d04f6c7d351e8d4b3c3e24b98cceccac1
SHA5125670123db2f2feae60bb6b3383eedd377b66c18264132980eca3a2afe075066669df1a71c5f3e45f87536faff12b46660dd8959e94f09200c5a2e1f9f27e1075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59890e8afd22ad9835a6a699b791c3b5d
SHA19b6cff9acee40945f28814404bdfe4ea63656098
SHA256982ea22a0ecb20f0f927632f9fca9484d825ff57709d670a8374a0a1ebe326ef
SHA51291737813d7e126622a08bdb072eff6e5de71bfc543b37825e0031ed5134951e6e52fa668f42f4c959a30b91b7e117d3d2ce6801f34b5443588f3e5541ab5ac55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a425bec3b6a7eac93b0e826e383beed1
SHA1d60f211bb4d043ee67e96a9695a9ed6c5fc9dc37
SHA25658b0495bdbf8a480773132f9ddd79a52e068c2651de1be2593f4c2459893f9fd
SHA5121f342eb7fd60efe00b45f945304fbbc9a916933eeaa868e6597e3ce9e36d7ec018f2000126d7ab75116f61418e73422fda6c1bd1558aa314adc91bc956e0f72e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bde0fa8050a5a0d1b617d0dc7cb367e0
SHA14c4f1141039bc44003ea0d105fbc281acb278c5f
SHA2569cf77ecf50db801ba7c40d96b21714f37db2b50b318b0c3da6997ec7cde82db2
SHA512892f978a749cde695517a6a8ef0193b417b0744eeee0c38b49455eccf5048d9c9c6d259235a94c53fbe3c9028a6e146a4d67b11348b7ef9da477d2a0c608af87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d5ff01b746aab23a87c29a862f14dd1
SHA16a33fdc8e6f38fdd3abae78a870db66462f06829
SHA25660e13495cb8260ec564768eae10713780d126bff13b889f33064f41323fc7462
SHA512ac592c13267cd86a3e383c975d91a41bc0015cebd4488c2d6543e4a3f3bcc8950a71337066fde6dc25d9150e7df4246fd8a3a7684f9a966d7ef81e332ef91485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513266f059615f65f1c88a89ef3cfe894
SHA1d6878917a4b3dba759493f1adb19d1a37262f58e
SHA256529465bd1837582089656ea4c2e2e2fb30c7d567346f2bcc6186a8645941a243
SHA51274c47be61aef5b275d2f3a81f9729dbbc923c34c25497c4220c3bb55fefb5a8573cde97add3ebbf89ee64da2646ef5a4f8eb0442559a2b3662454f633b22c01a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de95cbdc3ca768085f79891016fbbfd2
SHA15504c694e845abbad26a5d61925533fee6bfdfcb
SHA256a9bbbeba76f5b3d5cd0c2a3104500285fec899ecf9b35d15ee06ddad313224bc
SHA512e31c6e1cd4afd4b9ef446714a92dbdce646cc4db04131bf9916a7f3a3d3066889d827d6ec9257bce5376dc56e6ca12e2360ffb3595cbada4629c5e88a47250c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52672c89b3570bf7e6c5be0bdc9c5a579
SHA1db1b49eac4c370bea96ebbe11bb5cd4a04f2de39
SHA256f92c1ac91c87d72a529fedfa3adcc04d5e628a8a321e58b9fff0b2eba88fa930
SHA51200783042b822a3d5e7266077f8fd69cf17b0ee3e8840e0972378054360a67dc9691e76424565861aeba27cc5c4a2fae299a3c375d6132851c7ca0724cf3b034a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfddf9f19b073d901ea4d942035c7ca7
SHA1520023f05ec2d1a70c07b73d9a817c9d4b881ad8
SHA256380dfe17ac6cee8c496822526a9562af7154b50b25357623ad04dd19dc754e7d
SHA5126b3ce64f02c014703a55733ec00d68eb141c63068d655e7239a56f752f3ba50c78ef83a8fc50374d73dd928b969b26bdebb55316562dbb6d30e3048c8b0be9f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1bee4c61922cc0c8e803319c65c8b6d
SHA120fb5c8d045e85fb64607a590627ff57cccea47d
SHA256510f290e22724379f8980a35976dd210e493626b859ed3d46c14687d610d8821
SHA512bfa3ab10c883a8c3780856f2755a54d953cd0700bfa815c556561677666805ab7e93c17fc319efd938721a254fcffd4c81820161217342414b2c3c69274d91ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56489f334e641dcdda5aff39e564546b7
SHA119f46cc07b02344cf4d13ab8ef304f5c7964362e
SHA25600b577a9e07c383f411e9cba23ea25e317b0de7b8e473167062bd1ce25cc29b8
SHA512d676d910d65441b3ccad11043618a6bb3aa6de9f54fc15fb819e59117453a0a1dc398e895fe505d07acebf79a4ee445c38362f7a622c89f1c69290dab9dbcb20
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b