Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 09:26
Static task
static1
Behavioral task
behavioral1
Sample
171d09b5b49e8253fd799ef65afefc58_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
171d09b5b49e8253fd799ef65afefc58_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
171d09b5b49e8253fd799ef65afefc58_JaffaCakes118.html
-
Size
213KB
-
MD5
171d09b5b49e8253fd799ef65afefc58
-
SHA1
eddf67c3636ddb1a10fda9b6658e38f75cf9b21a
-
SHA256
1c860b35759c78831811733f6e8633f0ce944d2adebb0c8557cdf2d72579a80b
-
SHA512
28c7819219d02749baa7d933906664c5d73da8c29eb622afcbc82cdca9b77576abc2a446470955ed4330a09fb2e5ae9910e24fe7062023812c956a0e5551d0ea
-
SSDEEP
3072:KrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJv:Cz9VxLY7iAVLTBQJlv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434282255" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f1c8ba0817db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E64069F1-82FB-11EF-9107-E62D5E492327} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000747e90cc4b2292fab495b4119166b6168590243ec4d6a592b23228e62b5a8e6b000000000e80000000020000200000008f807849592c68dfb503ddd76b210ad65c997a6c321bb197aa607ac17e4ccfed2000000089cb469f232c7ed0456caecab27b3f1e7bdfe7ba001d9ab388843199c5a53328400000003ad697db89b647e31adb07bb07441b4a1c9df958ea6b13f1598d2da2bd2894b6946f52dc9b56660eaed698db663e3bb40697a439661c95e522a8fc422626d682 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2144 2956 iexplore.exe 30 PID 2956 wrote to memory of 2144 2956 iexplore.exe 30 PID 2956 wrote to memory of 2144 2956 iexplore.exe 30 PID 2956 wrote to memory of 2144 2956 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\171d09b5b49e8253fd799ef65afefc58_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4d58f496ebfbd470cbb8315f9604b2a
SHA1ee70a525edc1b3bd54ce7740e1ee5fcf9b7e1561
SHA256854bd8727868ddd37f6eb3e6a986ea76f67b6f9dfcfbef48c28c8e1d5a0e47ad
SHA512e350f6ea713e8049b92bd506ffa6bbe82ecdfb03632da6bd7c242df0a89300135312ab84cd2314dcb98428bb406b0b15d81d8b60e01ad09d41a6a9249ca070e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54df7d268e87cba5c68dfb183c57776cf
SHA1614fdf5f58dc4cc9843916474fa6f7ffaf620e1a
SHA256057732113f714d04be9625e2d481c36fdd57988e3de8346d6a7cc257a4443bf9
SHA51222bc6931470ccb5a707ce0bd618f8378aae068bab9995a4466ab32d2315233bb39bb8ef637204c81332f831a61e72fa942a3aa5a2987a8e1fa5d22e3c2abbaeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d790146b0ba433200c1b4a78e35fedcd
SHA133cfbe6d0dbba8a9b3db5fa12dc907de6a3060cb
SHA2566be349a6777047bc9585de456f2105cf0027ef4079f24fb2e55b6b7a6cec8225
SHA51257bc00165cb86fb365a3f5f98de548f5bbf54f867347578c7243a4d234be5301b1f52cb7264edf18d1744a8d2a8e8b614710f665a5763280eae10ef0d1868e9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdee416efc6374e37b3112fddfc59991
SHA1d43099d12a2de57116d81a5fcb43ff55137c5213
SHA256a073f5957052ca65dd0c1b23908abdb05912e351d9d2f688407bff033f218ab3
SHA5123ef9adac41b4c276140f0da6e3de1f814dc523db1fca129549f6296dd80ca193342d9aff6c084d2c98105d76b0c151373ab59a7d3252fb19b25c88eda59ee67c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584f05f95fc72dac5bfcdb8f99eec3579
SHA1d72faf09c9371b51ca8135d1b4c3688a95b045c5
SHA2566fd356520dabbea20f802488faa81533101eaeba4b131382d8378e50ad8494ab
SHA512401055f28ee1c602b049155451403074f2fb86796dff12f53cd725d69fd4f7629561c3058a1c324a16f8d8e2213a2083c81fd474f15bc650968b5374e12ca1c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d63472f3418986b37ddb93c7222ff398
SHA1cf7849752e10b45468250c890944fe02a0b0ff9d
SHA256ff91ca227da035b7895f46acad15a4a6c6d7c48bda5192363560eccc1f0f3047
SHA5121f276f88332d8954fed582ab6d5f71fa3628bbcd289cf0744304e89f10394b452c96048b87aa7241c85127645f289667b3897656963525837b8d511689e86399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e588bcc2a9c8e2d824553081ae7ade7
SHA18b25fd412090b627a0683ec0d69a2b6447b78007
SHA2569e0144ba6f25d9d9c5ddd273f5b4bc33a41d562ac070970f3058102852a2e39f
SHA5120525c3149d4b7938e5217d978595717a06b990e750d881dd15a6fa0cdade66752251500e64280388070d6ca0449b7e4786ce4eae6d1e7fd9e82391547c04bfd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b054e620a8a680cbd0576ca5564d3d44
SHA17bee957ceab070135d4a04bcca8a9334290ebc3a
SHA25688791e430895ea3ebe0a85af1ff15cdb41a0097ca9f89ca9bb9a3f63d1ed3c96
SHA5122aec8b094a28e1ae084f184ce1555fa348911e938a469e5e71bef19a22218c968556b3f334a295089d1d341e1e7ef0cd768656a250db74f8fe41348f571f4b15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d37a896d791276548f45e6582f930879
SHA16e188b8bccf93026bf33d8e4aa54d5b1df80f493
SHA2569755841097b21d29ac2c628a44c0159189b7a5cb15d45ce9b39add5a4232e69e
SHA5128bd1fcf84bd30d8e4d46db9aaf87af56886b6eb63800ba51f698306b9990fc49e3e960cdb31519808d5e2941dcfe0acd1d7365e5d2e9e9c9f6e2f139954e3a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554c35d2932b8cfe8ff14b428516e7810
SHA1371e336cee79e6c0bab68007390c0440960c9797
SHA256b55b70b5ffb32cab622e2e8b5921973225e44ee4dd3e1136ed15a818d0cd3b6d
SHA51236e5f98926de068646c9d2e9a26d45762173fa62a9d5123ed32415228241b4788dac17a21509499b4d5da9c5f3fa9e5e941000a071e7d4faacb90d1c450b02ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521d082b36167036c265ba6c6ac856cfd
SHA1dbf878b49e84a728fdf6416685e0d345b9facb04
SHA2563c886c483cd0518d17a6745fa071b1dd9b9033ca68bcfc800dfc7403820c279e
SHA512cfcff56494bedf11c2a0d0f13fc88f72b8dc18dac9861c8b063a94076b2793aa9b44dcc823ad19eb934d26ab9e71e4f5439ec40c06a019ad2f574c105b2a1188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554727c5b5e40ed31d7e2a13b0eeafeda
SHA1c04949a5ae601d7e33a23fdbdd169cde2c10d36a
SHA2565aecc9ed261350b5562e069695f918d7a9d641f97c5a9d562937a296befe655c
SHA512729d17cfc9f4d28c12e3375ad5b709baf55c387917f65f19740982b9e3795b17e15de620681d6699be478d731754527952aa6c3fef41242a2167e3f036b84b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa12b3e4739356c38afa5e97f352baa8
SHA120df9015cfa3456a45607429285231485d69e109
SHA256bde7f9a6079d85911320c2f7c46d88a2fd665979d41b08026abaa90cca47e571
SHA51273762393dfb056bb4f4b9bc7bd78b7c1e7017f7bfa34bf5c62e3331806d748e36bbb6aba169c63a9eb3e5fb5555002f47e5cb80979fb366182cd2260f0a24aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6523c41766f6ef6b89fa4516857a0e3
SHA10ab4df8d91bde5ccae43f3629d234ac432fb23b6
SHA256d9a3e02aa6aa3cab17986798d40ad6e5782d7c7a7d5065a0fe8ed905c9e331bf
SHA5123e72520553467e110ea809c686db22802cc6d7fbe212a4f78226edd425880961d3da61fcb0c2f951319b8b99e46c211212ddf347cea1bfdb7c6b6cd4d28d3a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e63b4c86c299910e02bf52d36dd37d5
SHA1ecba07263648a2b6f1a3ee6690a95fa37e878673
SHA256878632bae1054761fbd0e15b1ff8000723f0ef45580210083e0ff70463b1ec98
SHA512e2ac5b8d51460400a802e3ca2b3fb2a27377d35e9e13c6ffdebb068ade85b983d22b02b53ef2bbe312296128c92b8b186a699978e5eb6e82177093d0c65e90cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ef80b64049c1b3d4a48f54b8ad1558
SHA161719f9833c0c1b9d3fed23f82abdb280b186726
SHA256008f3411d1a29d12842b856faa5020e1221de61b03e29493d1dfc935ab0a698c
SHA51255d22996ed595d752a316fd9cb84732d99463456c0abe32774c8d2551acf6282ce6858fd5ddfb02f66bd4b628274fff634a54f97da03964febb7538019dc5512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576e6e648d49bd0e0ead12bfa95aaa0c6
SHA1957ed47fdd114712a8a190c6da0d37e049a87746
SHA256f0b36f36a2ffd984b07cb86ab71493caa96cc0e2c5542831851da5ee96adb16a
SHA5128155441c62982d6e1e6ac3273c399c5bd53e60cb9d93b38c42632b16b50025b3c215e3670b69e7e6f771800ec376020bf62546704cdac7f0f325fd79ad437688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c73033d7e04e9beaba97bf8af37dfe0
SHA1c7704a40797338dbcc196a50726b20ee3a911b5a
SHA256ba5e570293e10c67de1e2ccf18a748bc0f2b4a4fcf7f91e90dc39f39ac9e38e0
SHA512b9d0270e75313c7addc3ec483e7fbe1d1bcc229cd704ece702d9ee38f6e60d5d15411629e2099e2dedd019057a95aad808a99825077e433d1ef60d570b8d1899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e598ae2e1f1c1cd0d5d63458826bea5d
SHA1aef039eff86ac3f3627c76071b568e0518099788
SHA25691bb74895e8b79ee4336bc12c5152978b50eacb0bb9e20067185d5c32fe7e88b
SHA512ac84d5c2d687d5e94410125d2edd344b475d069074154abcb82839ddfd2ec186c2fa34accefa57a2e31b9de36202a2993e14e4587ac13279276f1547c5f56094
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b