Analysis
-
max time kernel
138s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
38b32de9d4135a1a04a8b7b59466e61b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
38b32de9d4135a1a04a8b7b59466e61b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
38b32de9d4135a1a04a8b7b59466e61b_JaffaCakes118.html
-
Size
214KB
-
MD5
38b32de9d4135a1a04a8b7b59466e61b
-
SHA1
fe17704642c8ace3a7cd5736a3283df56b11effd
-
SHA256
b135fa32d9113ed71dfad1299df48032f30849a130a8a51550e7a057361865f5
-
SHA512
38870b34bb88a2fec0936a175a8dc8f92af8728db81fdeb64af45d0a5f70b1f7d9436a3580e377c466695b7eaf159009865e3cfe5d7b13183d23f750529e8941
-
SSDEEP
3072:7rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ7:Pz9VxLY7iAVLTBQJl7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434874181" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2095072a6b1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15063371-885E-11EF-BCE0-DECC44E0FF92} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002724f75410bd2f41a6718b48d3b0b24700000000020000000000106600000001000020000000841625ae3ec9a44c0a0a92962f2754171cff8a14a68f5a245928b512d056739c000000000e8000000002000020000000489d75a0d893a92c1a78b430b8f4cb2ab90f00487ea1ccf8fb2780f1e41232cd20000000dea2e8d0a9ae872f90ae7e5a08bfb3486d1afa54aa4c964b709025c0a6b2c4db400000004566887e186168ba2d87d5455f926431538e20ce773e9452f5c5c661ab3705c5c80c127d064bd3fdfd08962ac462ab78b376b0f53204169a594810418e951a2c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1560 iexplore.exe 1560 iexplore.exe 980 IEXPLORE.EXE 980 IEXPLORE.EXE 980 IEXPLORE.EXE 980 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1560 wrote to memory of 980 1560 iexplore.exe 30 PID 1560 wrote to memory of 980 1560 iexplore.exe 30 PID 1560 wrote to memory of 980 1560 iexplore.exe 30 PID 1560 wrote to memory of 980 1560 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38b32de9d4135a1a04a8b7b59466e61b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543eccd2aa508f81dcc67368a928dd1b1
SHA1958f3291466d3218e6226703fd948efb94083224
SHA256973364963c0fe265c32a0d3878adb9e91c798871e7581e139d6b1bf0e3e341fc
SHA512881878dbdc9fcf343bee4a0026b3e56a2a851be0df5d857b2f4c59a0bf4078b694bf0355e2ed893b0bb48340cf39980eb9dd16c8b95aa2ffe39534d6ded44868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521c32c09818363ae31f62bc9592ca975
SHA13da5ee5a22a29e4233d39c5522b24c73ce964228
SHA2561d1339f944f523aed0763a761313beff5fa3e6456e98248844cf3a47749ca4cc
SHA512a989bf287316c8beec6978bb9244f7feaedb3e6b858d7122baee00a79287b3688da095640f9a2536902e8d03bdadd205d1a27ddd1469376124503ad6aa42416a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e1402203a60eea3eceb06ff7c97ca5f
SHA1340cbf2b0dc7077b078d670a017ed25e51e1c6e8
SHA25610877e24c9799e110f6195d466372c18f24ccbd4b762a6d0773c0f92e8c6e869
SHA5127bbd18472f50962e64c2f6460e3a2c754677cce589b5da3ac3fea00456b1e78c8aec66d4e60c0fc07dc7705400dd5391457ef1023a0ca2e46fec9401097446e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d371085dd02e3151da462ef7c866c3d1
SHA1d1c463ff147ba91dc6ea3ee3de12b7257148ea3f
SHA256a66bdfb313e9fbc7da10c0e856066f1c2b97605d3f121a896670ccad0f43028c
SHA51286885f318505f3c8f205be6512615f66dbf3cbdcf8d3f46f95f34203a6b2f007809cb711be60f6207eae8d37bb8b48c9bf8716ab622b3e503d92c19c61b4776d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f08213aa80864ca59e35c5537c983f14
SHA145d1fe33a606dbfa2076afc903fa2f4d95714c16
SHA256807ed407b94ea6fa41fcfe6851d15338d0debe013067c829def9f460e740cc9e
SHA5124b0af03b0aad89deaceabce128ce57de12a4f18c9fb3e6823db6fd4b202e4bb6276021b0311c216e7902230d758803004c2afa44631517c47fce93ff9f231713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54511d274fd53db998109cd0121ee6f48
SHA1c54997b5cbea9ae1f87d6de66120b631622004e7
SHA2560a5823c984cf7ce8e0b39d0a5bf3b56e68b3870635960563a53c66157d3a76c3
SHA512cc2c2c2fbfc8b6d3450be573e87c8199c3b55c73c7575d1e1961c5a5f7e01395403915246268deef3c54ad43490981c8139f904c508c35a3506e13991028204a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7eafaf29528318220095e3669e9cdcd
SHA132f64120a671aa3cde15107e8893eaafcc596ff9
SHA25645011d032e8f67c7647d0656308716894ca8c020c8339d8f26f1b36282561846
SHA5127f5c0d62b0badf29b80910890afc243580b2c8b944ee1de82c9a6ca98e8ef0d9b08c75b48dbbd7d39ea32c771cb40286425b6cf67877e24d241eb702cc3b6865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5430c5018c52fde64850cdf18b3165cde
SHA136f43e0d33f93339f23506d1d9fb41574d36da43
SHA256607fa718029deb2530311d1b8ddf0a8349e8393ebdb9220b5a642c7861751576
SHA5121e29db12e0c7e01c4f27c353ab71db44cd0f6cdd1fdf74278cc0af59f9c50d68f6633d18627452be060901f344ea60831b8d152b61a813cc22656cd5137495a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e114a6422baaf9a2a2fe41764e191c89
SHA194d44aa85e486ba0a59e1f52cf6b13bd3b27e409
SHA256bcc1d7c00c6e3e2d5a1f27e480d32f1bc66fe72a8d2de9ffb2bea9eb9042d30b
SHA5124165537ef655b50f777c27ba07c7cee66cf4aa06b02932465c9090ed44b9fb25db707e99931d688ddf2893563a80e7a8fc63ddf6dc8444a20e9e691f60b8a5e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3a2c1976ac4b2de45f92cdd92dec680
SHA1ee8ba8f8b14e3367899f78d598a728e394b69bde
SHA256081a68e5724f39300bb283f591e03a6c52f2e0a4cccdd5412addff95478ad43b
SHA512d73252afeda97cb26d86c61e9ab9b939e07d66101e5bc78ff54857f9a1fe4199df67b86f5c930dc059638522ca9351907d96d0f6c62517fa85334d215dfc1a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50918b3b49a0e33a2d3c1504010dcb940
SHA1f0f234f17086de1af01570594b25a0916b69965f
SHA2561dfe8fe8a8897e41fef903dce888da23d987de398e1463f21ff4a101403bc926
SHA5120dd9c81c0f7546a0bea4721f732b9ce458947880cb3854ee1a4945aba6b80c9abb4890f268fd609b8c048e033f9f23d7fb78db75a03402b91ed26425968dd828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb9b8cd34d85ba73b9fd8573d37ac9dc
SHA18bd08f882a77a28ddc90e85f2e29ed50de8023e3
SHA256ea8262f93075e98c4a4430c7090079c63d1fa7435476e894356296ffa0508a6e
SHA5129d295e4edbc61994f44a73daa5729a1d95b8ae4d962bcf16e4764dc1c14ab2acce8e7ca56c33c387aad687693d2d04439c9803129c7875c0aefd3d7f451fee80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd1260f89bb82c6a4a03828295483d76
SHA12920f0148a588b3da4b0371494210ef40d2ca817
SHA2561e0642110a7f156c72be23b32d64766411f2ea63f4f1cbe528abac24d6e6ce79
SHA5123126727733463d8b7e2003825b6b5dc8312b010b5d5620a2880e8051c18c8d322782c6ac3043621e91bc4377f5b4da0c5e6ef8ad4b8a7306f350957d5d2e5388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531a6efe46b382f0a5021e64e8c76abb2
SHA14a8223df16d926788bd3fdafa0428d5b85ff9fc9
SHA25630076cecfee607b6b50326887fef83997a785b8419266ca8c04eacd4eefa3414
SHA512d9ddd60f41083a1cd8da3b46c3e261ecff4778fb6856f3190e23ddd252fedcc46baabe5adc6a80e290f455bfe1c41dc87a53b07bc6b9ddbe515c772a8576a723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fafe3668e02d498f49c75a287314472
SHA10c72b854158604ef2cb208d6d6ec44db7fc59ebe
SHA256cfc39ad940b28bf97f4d2dbee118d447c1330cca8cf8e175fcf9df16beb00474
SHA5120b0f6d3331229633dcc7a29be597ae2ca61c08e68365d18a726cef7e32eecbd23a24c911b81cef617601a239aaa7570d166ada09a9e5b0ad73ecac707458a360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fb13ad777d3b6203c6e5f658566d643
SHA14fdd09af218526e698269a481043afffb6d9c0b5
SHA256363e59178a032e09a09c394623395d28a358d1f6cfbc4c582ded8149341c9d97
SHA5129f4e65e94de0f6b7df2ab44a8b9a3357193bb3d837655ec02d49ab6c4a5fb167fd619fb7dab8294429ecd2de8d6f1f02f7a6a7342124b3402892aee02c74c343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511d175b0cfa42bde4c92b48e0f10f14e
SHA197d47c8569b9307360d029a77f61ed72b9284a05
SHA256c695defe7098d26eefbad6b0101785537b71fd9737a1f6173ac100b99f96ec2c
SHA5123aba2c609d16d42faf582fd5a5b6dbe468a0234cb7d9a2d15cd6bed71f68f5709ff4b32085aeea8c484233f231fb7c63fb2f6f36f5668bb0dce027a49bf335e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b948896139dcb7b40008c6f815644692
SHA1fc89f350eca8e7e0e7f459bf6bd3722fd9380e39
SHA2561cddf012f8f92029c0c1d0c3ccd367f8cf9da39194d7dae707beb50999b55b24
SHA5124a779af40d7874ac2a7ec8e2d6f48610f6bd8f17b6133d760dedf0414279e33bd37a16b0b9ea1c172f51c29883e5199002e59f7f940bbad6a3f10920cae31d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d482131705a35100341ed1fd83d35594
SHA1ccbd5bc41fee1eeee938829cee5866567520271e
SHA256f92d8c3139548bc44b9fed05ed3c1e4bf37f181794390c63fbb87c2048d6c86f
SHA5129b10bc51afb810a650ffc531dbe1201e69d2fc06b677b56f84a813629d24df69d9b6f7cb8a65394863ea82e282518baa2c875d4bcdbb808a44cacb1edd1148b5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b