Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
410c4bcbbc899b6a5fe89a64f1aa1510_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
410c4bcbbc899b6a5fe89a64f1aa1510_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
410c4bcbbc899b6a5fe89a64f1aa1510_JaffaCakes118.html
-
Size
138KB
-
MD5
410c4bcbbc899b6a5fe89a64f1aa1510
-
SHA1
8fe1c7e0a1b0478e57f696882d55bd5fa92e94f0
-
SHA256
649f58f04e5c4153f259a3e192353fa2e80c2b4d8b190357f0d22d92105ea493
-
SHA512
5f66408dc4166bc71a6e276c49a9a1458b58315d9d92bbb4a8b6806b378a904635e2fabd6074f486b810c338a6aca7880cf7b332326ad0104c1d74c343b8c513
-
SSDEEP
1536:S+V2DNRc2lyNgyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:S+4yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9057c33b921ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435000907" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{239F0B01-8985-11EF-85C5-7E918DD97D05} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000046df37b2c511b18f1b24c5370183e6b56634ab55cee7584429f9c4a296f84b7c000000000e80000000020000200000009f7a59d4d969b16be0104b2bb4f5c3bb74582cd1f454cfbb74557e8f6f6abeee2000000030f627ea97b4a9bc5abfcbda5623396965df1cf953b1def107ede9ef26e082f64000000099279fc369df43d32f7684ac66e69c936048f861353d72bf6312c41b24d0806aaae2795045055a26b55d184ff4946283da3db4f3996c5e18c456895f82647fa3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2352 2308 iexplore.exe 31 PID 2308 wrote to memory of 2352 2308 iexplore.exe 31 PID 2308 wrote to memory of 2352 2308 iexplore.exe 31 PID 2308 wrote to memory of 2352 2308 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\410c4bcbbc899b6a5fe89a64f1aa1510_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d29fa451d1aa91e72e294cd0cfc6c561
SHA159dc0d86d9f43cb6ab89dbde8b5c72adf077c222
SHA256959cc21b025f61b0c051ba8e025d753b062cf0b4fb11266625473ae7a3ecf88f
SHA512d1e94891b38e8733438099bcbba7a40abca918f9cbdf1751c1c532b9f6ea1dc1bcd0190ca072524f864f7b340e6d4652d0c5ce1e350bcd28de9f8c539a139fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d441e7bcea4ef8f095c9a5dcf6db8e21
SHA1f6570dc2ab9d1b7159a95ea6e0b4c277ca9c0dcf
SHA2569ef0d8f85cd603ee9b8127d78ebf36292f877c6a2cfc07d73dab645468b95619
SHA512ffea239e7cb890eb7a8651f23f60cecac0e60c35bbdde17997e9a139b37527f3252d2370068d37d4155756cec9db40027ca379bfb925f76925898df85037fa1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5311918864259c7737678119b503383a0
SHA19a65cf5b44d09c7400d9600c917b45c00f498447
SHA25653194b4524d6fa6636bd6e4bc28a8e56dcca31233c40dc9560c69dc2c9710a90
SHA512f450ec5bac489a2a1b34cdd6c5e69c4d1d172be2c4d8dcdd76924f290f9299245668c8869e2b95211b52d789ad38925d331de0a53ed27aa072a1c0aa9a70fc87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b705b33a2f1b9429bff8817d0451634
SHA120750d908a3cbd115bb76a0f508c989701652fd0
SHA256500e7b1cf1fe2c77980840b4782f25de2daa2ac99a78bdd32c3adbf96b5c4d7a
SHA51245a2edf6d521f6ae2c67dd72220d2652e6ec747c25a793f82426389d24e03794c758f12a67fcc148009818f7b49ca1aa5fff7a791d07a8702af09b02ebc76dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d0337fdf50178b2b8f6023b2bc92d2d
SHA18c9536e99b7fcdeb64ee239fae310c44d214a1ac
SHA256c133f5b6430a2f532112c1090b74c986efbf8069153c851d12009b56f7cea020
SHA512e8c03602e78d3509ece5d8f5b7a416ea9fe93359ab4459aacd107271c1d07fdf859f3f5e1b242a4fa235f67dc09f88a3d2bfaee2f30d1016a75eebeaeb430ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5770719a0e314466dfb541b53c8cc9e21
SHA1be7d5b87ac7fd7264a9dd4f7ac363b107db24847
SHA2565a71801174dc5446e172b05a0e90a21cab53421b678f99955d65c8784bb8651b
SHA512d85c8abf738178ba55e560461432d014ed32c8d510543a5c4e2b66bdc2a052bf33f37b1bbb9ac7da6d583a2cb7a2092a3dbdde96e0090c6744b2b81ee15cc5b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2a35570e4aa67b8bb92db5d1d344dc1
SHA1dde68e3be8259ccfdaa87ad9c3507d0e7d4a949d
SHA256115dc8550457d6f683e72ee42c692cc32d32cd53001a0824f5a5f12c59d8e5dc
SHA51220c243b9256b1e4af88d664466a2cd82edb2d1d9108630d41274e15ad64587421bf68af43bb495edaa1b76f21063a22858c73e4c17368d47ae15ba290d1c3167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2782ab90c1256b00f86edde21e9b76d
SHA1d7dfafb43ed1620097cdf0933de2328dff2355b3
SHA256fc29df8abe28c44d9937037876d2bb31c9a8e8d04911413277224b67a1a95d07
SHA512281244ba1ff270962a034c0a9a5c85fa472c57e55b7d83a285720199b02c74db7ad4f2e293c05542995312aea12c055aaae06dacc3ff5a1145904c87b2301bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9b04e8e5e741c14c4119e98fd1d032d
SHA1ffb0f19910b1aa42c06f5ba69bc2469a95b2551a
SHA2567316f84f01a9b645fa0bfcea432985b0aaa74ad334441eddcd1705d33f016794
SHA512c8301b7973148c3aa08dee65f6e031609c78b0b3c1bdf5a5e19e13ebbc0e41c2c44a7c962d8ed250e3f06197d2de30ceb9135d8a64301ea9f8311dd4863cd323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f4d30691bb6000ec7016cacde9dc66
SHA16753b6b046bee7a829e1bf8dbe11e1223e80e5c7
SHA2562da9bc6e368b9040a97e2cd44ff68a3e2e7c93e38250a518a5821889cc2c7d40
SHA51237bb35cf7b1c4f763daf8fa546b13abf5f28eced068175ac1e29b42e7c1306d5f14b1e5aa0792843b05a75e3cb829e489460a9f366cd27afda902c2575d33a65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5643479245228cddb5e323ef641f99a7f
SHA13ba11f19aceafa98487298afe33dd575844a6356
SHA256ad56c87e15566ee6b355eca6431fe68a42c49a6f263de1af4d9770c3c4e088bb
SHA51214bd2fd72e812794b403f66574a441b8349c66d74931341589a891feb206111d7ef345db29bfff244dba9f60fcb6e5c13d8e0c2e9c4c61d84aa050307805a4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536ecf08f4539337c87546f9c3d155cc0
SHA1b533be6d8b39583dce95ad201df8397239f8c977
SHA2567ca6eab1a926d7c7ffdecdb1b29d07e13eb055a4fb872d7b9dfdfec62df15591
SHA512643a273dafdc6e68dfc3b8a2c5bc6866a9c33042c591c40a0076a8feb3a6fca9730ae7fceaa6269bb84f72ffb7497354b29296eb75c52f28536dc02fc6307dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8231675424e11b92d0d967cea880382
SHA1ff4d7590ad3c5b79032394c75e768fe2e91325d8
SHA2562e9d031319aac6bff3097ab608d53185406ec08da77909d3e28b063dd9a48777
SHA512fb3a989595da5cb4293a03816c76e21ffb95231d388e92c3d1c2d18561e4a59f48a667b6dccc60b5d236bf9d236a39ee74642e029500d663b2ac57c81133c9b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b883e10928ac150081cf20d63f2faec
SHA19c6f5ed607bf6ea4657ef3ab5192c4799723cd73
SHA25661608254ebb7941e7145e6758a9935c3ebc317c67be5b998c431080658210892
SHA512e7edc789f071a011438d1fd911db46e4792570fbb8ba73967c9972ac312cfcf89d9105eb5e25a4cfaa35da40640b38945a28ed401770493298e1f5451c907c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fe248bcad3f2effa851aab46a01f1d8
SHA109804268da3073c200aa351be0a3e09195c98c76
SHA256194231e583601b50558e7c5410fcb9603f539c5eaafd3354ec17bbfe6fcfc8b7
SHA51283af5162af5b1f4fe59941df56eea25f58bf0d3bec620c590c241356d929c24ac9b88e1da0d81ce81f40367f2852e18be92cc3e92cbce0227815ec8c01245fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545ee7fbcce77f3475ca405f72b126645
SHA1c4cf801da704b7912f229c8659c7d8b71b7e4b1a
SHA256dd6394c700959908032b06c047770cbcd26dcff52239f29b78bf73e1f1345c4c
SHA512c685f74adc96530fad2241985afdbc6e28f47ac1ccb90398bd8b9254728a93115fae12b7a0b05f67b1ecbe1441f20dc9d401d65fe9a6354bca375d68d924878c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ddf3fea8c3db6f47aaebd3ec393667
SHA1aa7c38778380eadcc6e6c67016c761e2c707214e
SHA2569f6f70b1f30c7444c5c81f27e778202361591cc4b7b0f281e4218146ee58795d
SHA512adb29a99069478ec8495a39b7994b262ced6cb805d7f4394ec5c024cf4741a2886ce337b520f1998dcad06648db1e2cfdef4a0118c72772e2adef9e4f0ff6cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5836c19ab2b19ef53139255d82f28b735
SHA1b2329a63a5111624d33e5a9569bd2052ee661fd3
SHA256e509302928a2d5c79a05910172156349136de78f5bc8f639ecdc606dc06c0477
SHA512a0db6caaa8c7c6d0f54e10b7e0efbde97181b1ec902049c9deb12aaa3fcfffef5d90530f734cd8076278df754d354c324a8194b4bbd93bffa0f06724aec0c394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ba9ad889a46ccf2af8bac5a466be697
SHA1365e844b441933fc75152ee4f4017d46108c4785
SHA256023541e8a326a835c9b608ebf6990188d56f9d0b0b8f1f8547b5468c03036032
SHA512d370adda36e626d2376cfdd4334d47ba92544a374aafbf5dda67fb002efb3f52d7bd9126b48f3a646e440b32f95576ade443c7e2e9d2e3da33a1188bddae1e32
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b