Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
f5134e6ca06ba10b00e792deff12fd9d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f5134e6ca06ba10b00e792deff12fd9d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5134e6ca06ba10b00e792deff12fd9d_JaffaCakes118.html
-
Size
213KB
-
MD5
f5134e6ca06ba10b00e792deff12fd9d
-
SHA1
69581891e1f61f3a13645460592a0cd8ac003971
-
SHA256
956590d46e82ad356b75368163e9b11ab9005d78d8e3cabd09b85728df6c6a4a
-
SHA512
beb0fea158be50bb25e89d8906c5158b364329aa6e2aad301736b87a2f906fa0fa2bf8973d0706daf5ded591329d9bcddaaf9305d97a2006d28d04c7b3d3b5b3
-
SSDEEP
3072:OrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJg:2z9VxLY7iAVLTBQJlg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7902A3E1-7AEE-11EF-8CC8-424588269AE0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433396879" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0be934dfb0edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000004d3bdae8a41c8da65f3e5398fd72447c00e8fc90fa757f9fe9b9658cc9b70ef6000000000e80000000020000200000003b958af09480a9fdf235b66455fc1ee0b0cae495e2d46bc502ccd70e9a06531320000000eafa4a55925ef6fb6ddbdbd5df0cf897297c4bd9f793ade73470e15ad718b607400000005d1e908549cc14e2bc10d81f65615f07817901364214c374ca26958116ab964321192cb920559d40ec5c36da129ec3230fbce0a147d8b69aab2d241e985c5773 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2784 3024 iexplore.exe 30 PID 3024 wrote to memory of 2784 3024 iexplore.exe 30 PID 3024 wrote to memory of 2784 3024 iexplore.exe 30 PID 3024 wrote to memory of 2784 3024 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5134e6ca06ba10b00e792deff12fd9d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e15ff71b600d3ff90f1a2a6eeee7d47c
SHA13396b38fd907880714712590f7d56eeb4fb0a594
SHA2563e5e1760887a4d743520d12945a73fa072353a9290c2d120d3f8403d97fadbe5
SHA5120d6580540f50ba82e41f1444af0ce51d07ed58d5ed1846a89d8f4f3913cdebc977870163d94f0d5baba63436ca3dc058c20d79076d50355b48e2adc6bda784a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e850fe727113071aca1ca760d9d5a9d9
SHA156c4e7346adf2774f4daf4fc538706546757c8a4
SHA256adf4fc12be059d2d5c66730bc0c732f00f848083253e31d8899a4caf6b9b8f5a
SHA51263995c679bf7f10fad36214b37590b60e208c974da8c2f916616cdd49f0d749076fecbc4daec576ced03551675fa76966442f6ec7eadfb1e025a8425502f93ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b049a389052cc15f56e4e242a1816e18
SHA137441cd71fde481ee3da0352bf4c01fdb37327d3
SHA2560f5a6f301c286bc705351048764fcc53e58e2dfd4f15cce1e2e5507dbf74c4fd
SHA5126fdb012c2924275934ed6d707d6ba1b908ea599385ab0d363a826835c84585b4745d1af607913ef658018b068c42eca0fa0e4a50461b378a3a6eeacd30068158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b7d72bac16e8ed207c787ff68996a01
SHA1ff3bddbc3fbae0aeecf105d9abe729d1a2952582
SHA256eb51733db1f17489ea857c14ec9d78cc7e1cf32cce2968a279278b22d911d266
SHA51235386c47c5966e517a4205298da692202629e9e87b95ce9c74d279b6ff1ba84e3f0422edf8dd48fb936ed25e2da9aee01010ea1011e8a4a95816434c866ec93a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d73aeb3c66a5cc7edf78a7b9efc5258
SHA1396e5eb66703d03ac111074fecef2653f8f3fb91
SHA2568eaea749178d8b49bb2412e89454025bc59a68495532d6809c7eb2b954af8665
SHA512cc4ccf8bc6f74e60bfc54a66097349bb49ece0af19b57d9a70ecce802694c073a41fbb66400ffbe04a124d3cde3d0b83fcfb6dacd091fd6573fe4fb9eb3388a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c8231b650bdaa661ddd2e00949625b6
SHA189390ebedacca15419c1e2e7f331641e8e6397f0
SHA2567e9971ecfed217002e9b26e65d7485656b5202d51f24b0f5931ff232ce08f8c3
SHA5127f3443b7cbfa0a2a84ace769d5d47281fc6d6726c5f761e3a4c75c3651f5d7c5785085cfd6b0d39825cc939f3b117302902db7eb2ace1e3d83891bea83a67eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517c9c0f3fa55227ae42765fdc706c179
SHA1583554eb14572e6faa02711ac29c5392b164996e
SHA256c79485ec208b87aaaed57f99f1a0a94f8d37b3f5a78949b833f7591bf1d287f4
SHA512ec0df0446f153b2a348cd53131839d949e8955f4aa49ca9126d65e692eae3f414f15e7c202dd8eb9fb95665e1100f6ba2ff661db455e6c583727076d02d9d536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ab5ef502707b792748a3637e44cf9bb
SHA1bf3558276276d3e7f86340152afd94670e7eca57
SHA25626bdda26caac1cc2afb099453be762294e2ceb7dfb6e1e42c4859e9c6d88b66c
SHA51205d8412ead66769be69f10f600b6cfc17ddd82f04d23f8e480f4e155d4fa77dbc7c03130e5a156ddf8cdbd0c3814386a1a2fb0ec1476dc3e36e8ee7f3aadb9ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0a97df5fa6b193814e0819db02f0f90
SHA12f30bfaa2dc000f14a18d6512bde98e81914ff22
SHA256afed058586dc64eaac45c4a2da48de5ac0b8deb95fce4751aab77f5bbfe2d513
SHA512fb9ea16e666da23e870b8db2af2740c332f5a49b469867eef7c6d5c6c52a51f080a9c1e155de09d4266f868f507f1754519840bf904f03159fcf5fde6e562a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5436a95074bb32b514884cf3346c0ff36
SHA1eb64f2421d7ca60b38bc0df42ba784878afea853
SHA256a774968b429aa40c434dc276003c0e8923fffe46d4fbce3672afd47117392de0
SHA5128b88e1028bfb94ba6e22ce20cd7eab36164bed59782297dbc86dad34445965a14c42c41b331294cfa70440834639c44ead39f80baa1d88e499a415225924839a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5214d621a56ac6f1d0246c5c368dd185c
SHA13742862102a78bf73511759041a575bb60977205
SHA256d00769f6ec50e9fdec98611f15eae8a956366cc892355a31b827f49c2e17091e
SHA5122e7bf6814ec49d64e6db06b46339f64d4fd7155182c7983db6cb7537af57c90ba17e1b4ebe13a860e9fdd03743e119a57c072ed07ee00104b5ad7fd51568c9be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545864ee1ec0ca50d46e8df18495998ad
SHA1cc7de4eeccfa2ed4e1c2bc9267877ce03da28b7f
SHA25632866cde8e27b351667ae7c8a83d492bebf813fe5982565ae810afa5a0602d69
SHA512e4361a7b8d2e775ffca22190676f8ce34f5fb34c957cfa0345a26572edfa6b0140351fc6ebd07a80dea18d17ea9f38e97b6560027bc634e49d14353898a0eba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f541ef7966b564a62f79b30fb0345ee
SHA1323940458b8a797ad762b866636ffce616e8342c
SHA256433721decceebff4ce6d5f174cd060410dc876e8da553bd15ddb3dab71161784
SHA512e95f20d65923a5ae60f8d671253055570ab5261c4914c7a7c812727db7964253dff9c7d8dcfa959b9ae8bc5d73a7f2b0ea8b880c1dd0260364e3922b62b73411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5589796b6de26bd25e2c67cb069ebb8b7
SHA13f7e892eb7921039a5ce69f32131ad04260821e4
SHA2565df174c5602873e93262c0a95f9d4fee2ef9c849dc6a9f7be1de75e616e5b5c0
SHA512ca7a8ade238fdb97542f47bcb4efa151b2c808b1c6b3e8d4dc01e81eb8a7b0a67fffc674017e7da3519ecb5e38ac623c3ea0f78eb27f106c65658836411cee55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f08c5ba1b0fed49a14775bd21f4d2d3
SHA1f01f2db7037f4ac014da7c2abe2fb2ba576dab5e
SHA256ac75f2775ac4e840d5a7425de2289bd648e1b2f6b519a275da8250958dc78180
SHA512fb6743e0d78e048848434aebb8b38cd7fb88de6f56113082f997c0c2254df8a1eb3fe038881c37cab271457bad1b82b5b4ccf460b15b3f6d3a346ee2f6bff3df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592afa8677c08865e2bf8c301392e632d
SHA1b51a1ba6339dc658f8851cd20be091829187870f
SHA2562b78243cf77b9289c30c2ce05a0a5e808dd55cb059b50b6d48e99d5ff59fc968
SHA5128a04582a7bf8c6c58a679907cd157cbdc27d6114a8696d193533ab38fa484980c10cb2ada6cde67eaa3735ab04e62bbb12eb4fee00638f945a088aef8838faec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e73f505013e41b4d414dd30682816b63
SHA1e558cdcd6cf9f1da4c3141d5fd57bc83685342a9
SHA25617fc02c9966caaf3335ebee4ed6b597f7dc26cdb483989fb05ac180d41706c0c
SHA512bce4b513ac2003daa71ef644a02cde08f9a716540dc3bb16dffb58b1a318c8879fe39cd4f450a5a6dbb3b17e53a46c7f1e5dd9adba400a0aff26e8e90e27521e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dcd0a838520c5155adf6c47f306bc50
SHA121d14c7e68f120d7f9fdfe143e347e4dd126128f
SHA256274795891a581b9c046894d21220d47f1f3b1e167ba471c68548c16069264106
SHA512ffc273b710e08ef9f8a6ed50aa5d12c2e76d8694caac0ccdb5bb453c6e24e1dd6dac446a9c99745d474b494abfceec947f4b658ad0560fbe78d33c969461014c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebbebc432947393891c6298a6bb16aef
SHA1d61c7af17e604bb6564cd0270cc2c48698d931e3
SHA25685776b837a662e39daab1f0ce8788a85873298478114377ba7e9c47a4b84ce79
SHA512360639acfd097fd2051da1db430510c1d76b2b6a73619c31826319e543ed633ec0e6bd0896b097af9e781810384f9270a0b7a37681d61a5556d33faa651b9827
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b