Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/01/2025, 14:57
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_40be31f9acd0bffe829ca9193867ea6f.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_40be31f9acd0bffe829ca9193867ea6f.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_40be31f9acd0bffe829ca9193867ea6f.html
-
Size
20KB
-
MD5
40be31f9acd0bffe829ca9193867ea6f
-
SHA1
f1d3ea2b812d24cbf486f9e69686785240034aa4
-
SHA256
9494b9ccb055f5f9ac4d69b043b0954ea6dd7771927670e7680be3ca547dd907
-
SHA512
77bb69dadddc6ff8010e150b1c18b9167dff45b681e50e20809651cb12f8bfabbef5a1a662c2857c698eb3c68a97699f99dc1b47d76b6961700b8e37ab43b3d0
-
SSDEEP
192:qYSPRgJSSFnJzOF9A+3gA/ee94dbLq4ZLvydFOov88uigLA/0HPXxcJTtlaR2uA8:qYSPcAFG+bhy1Y8sVlvb19W
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{07685121-DCBF-11EF-9733-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bc6da7b163a4714b8d52753121f2200500000000020000000000106600000001000020000000b24907bbdbfa54a879dbbaf602b03352e0ca688d0a51eb7a5018f34fac497d0c000000000e80000000020000200000009bf1ddb846aa7e8f50f62881e6959f8d5accd4ea79398965587fd19087a9ff6f20000000d9a42a9b0a577a76d5ed89b0a04afce001d68107cb18c15de8fcd79c9948ca0b40000000df1ffba26ca25ff831e056987eeedae84cf0f3d107e4a6d93f65fd46f45cf5452f44772e742db971fb3628b989233ec36a092e6c2384cfac022f577e5a79eedc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bc6da7b163a4714b8d52753121f2200500000000020000000000106600000001000020000000be0067e3837e7d128cb9a9762fed0087db877ebe9fffb83deab6023099d31250000000000e8000000002000020000000ad213826e11dadc04c2d94ac43898a24ed9bd2eacdace3449dfc73d7cc6291d490000000b7c92d741a07cbd08d1a147e97808add53d0b18ce99fda0f7f5a172b562f3a3870ced231e4788bb1fd3dc49866bd4c35e7965944a41c13d7af69dac30593d9458ae6a6ad31effe1233541433f89b09f8cf7b8182f2c62fadfad5cd478f75795607c50c697fab6ebca914937c21c3293b7888c3a73fa527221be22ab4cbb42d698f8e1cc31ab857477e37388e8419ed78400000001bc4d634b68dbfdfac09d369719a06e86fb53f6b9363aeffc0fd517c94ca5eb7130d7c975b807590226be94ba66cdc2abe751212973f6f3aeb93ed1398386cff iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "444151717" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00c441e0cb70db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 808 IEXPLORE.EXE 808 IEXPLORE.EXE 808 IEXPLORE.EXE 808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 808 2524 iexplore.exe 30 PID 2524 wrote to memory of 808 2524 iexplore.exe 30 PID 2524 wrote to memory of 808 2524 iexplore.exe 30 PID 2524 wrote to memory of 808 2524 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40be31f9acd0bffe829ca9193867ea6f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531ee71f5c1f0438dd18468e143bd0e5d
SHA12da60a78eae6ebf061932e4688cd902e11762683
SHA256f0c04f64e86b202e80bc99489a61ca609dfb8ecbd07694715cbb3546e11c50e7
SHA512ff84aab3ae6fbfa3fa05cacd5ed72d6f6e1280c83f8c98cfa3d080390529af5144f9b9576b5c955af74815e11c899452822b7b4355236388a9c7071d36a16cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a5f59e90d10d63d9ac2db85855882bf
SHA1c0bc331d827cd2eae99146c070a5ffdcc8adf100
SHA25671676db40ce2f487dd027726cbe38da34f36782c76b2d5fe900fff71f669c5d0
SHA512e155d1110721abf37fcbaf20f702809ec32e1ff487279b09bc480c96dd92b4314de8367c7aae5beb47508dedb47b4f298c4d0808ecaf5e8c1fe8123f65c2f7ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc3f82919cd0b3432bd46b7d614760b3
SHA1eee230fd52ca5869a40b1f707dd8107dc78679c7
SHA256abcefad0e91f85ea12b7709cf7ae6c034f41c6d593689be8045cfa0f36788b56
SHA51224a8a589d07fb6f8c7b3685b9aa3f23d8bb235fae835bc09c885ae665d33ca6ddc8a34365e33cb59ab9a694eed066289a160b27a9ca5a8325c336bc5988169df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f49f20b5086672e08983c83ad42c1e74
SHA1598ce3627aa37999d70f58ead03fe46c32a19364
SHA256eb69548be23ec7e0d1e0d7e07e66be726f536dae06ce5ee66c86c17f771bc8e6
SHA512f5863d8e77d86685dd4432d0c8cbdbd9167d7ea48ff7a161e0873953b08d65dba57f2d14cfa518a31d1f74106688b77e4fb934eceadedb7350dbca571106b412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d9632ca5344895a9e91f38a3c5c903b
SHA1ce0f08ec4fe0c2d2c8fff88f49cf4d91b6c06c8e
SHA256adefe408e496d20c45749636afb7de7bfa20bd8414887232c55f5aaaef72e218
SHA5129cc079353bc6a4411d213136272a70b236f8e468b42446da9e6f7257550328ffad3d708402fab568a7cb601cf7f07159977d0273dda97b0f6e0620972f3435c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec2656bb367a5cc9aa50c2557fe52889
SHA1afcabd5faae1bcfb7e14aa0fe922cd971c61df8c
SHA25623d5b3bcf73d3e0ddd0f961c8ed8fb169f257ec79c71cc512ceb109782857ce1
SHA512cc8fc230b90f76e59ec5c42916bea423c3ab74fdf3096b9187f5a7f7254c24d585f3641f46f2324c81adddf88755afe651ff98d0618cc1edad74dba78a9beb70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e1474d7a2bb9015a9ef3b20b2694f14
SHA13cfa4330473ebc914f74530604646d5a5a89198a
SHA25668d44b632bab8888352b28ef1dae4415dfe573904e278c1736152246dce913cd
SHA5127bd2bfa43508de2576b27950d3b2e4dbfa2046190d280df61b344603e1b7ef63b07165540e292e9ef9442223194ad958f4a04a094ded9306968b57015f918792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53822c8e8ebc72964199186b9e1fe0219
SHA1df671ef16ee1d90c8b8e7008aeb33ad8c1ba486c
SHA256d5426e4d7f89423b66c32c824b15abd0170852a930ef6a4e8f3749cc08631264
SHA5128f957096ed35db99dff64250dd49a48f57aaf29b5727f8d0238afe493f1e5bd3e1e196c1ae18708943b1cbc0da261a479212628cd4eb7eaa201e59327cbb19ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a23f7bcf7e45590247d7fea2c8cba241
SHA15020271b2ad1721a6c9f47051d0727bf82549926
SHA256bf9a46b550e943034d2a4f1c5b643e9fdf6bc05e1d123564dbbd704321b2414e
SHA512d569d298883d97f708d67278dad90b3abd5495d10d4bae72048c3919cefbaa84ba71dd99821004ec846d79cc773e4a00f147207b90f6cb72c83b497923634a02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2de7564a498a67f1b05f0a1930fd2d1
SHA170fad1f6b417dabed0470f2568f620d74122740d
SHA2567d47da07904d47b64885764ea1a9db5ccba1d74748ef24ddc881ac3f256dd08a
SHA512013e54a7c8773081d81ba91bd08fe3918e81d832bb0125bd3f22bb282c31e86ebd94a46716340c512871698fb46ae6a406bbf885d01e7b5173ecece0a0c25754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588f4f6209150950b8af658e2e6dbaeec
SHA1e1e99aa402ccd24c904a5b1b85ee27ea619adf6e
SHA256f38fcee7332028c0feee552e0fd73f616b19d98f056c25abc2c1ff58d0fc453c
SHA5127bb1028b516769827a8106cf7ffc61cabcc6e1ed495626acdef3b3f27fde1d0570e935693cc5a46a98c1b6289bc2a87b49e534405d2498c163c4c093a0c3e779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544d8e070f1ccc8a155717a0213772fa1
SHA18dc64497c721e67440f3e01d0536121c2436f0b6
SHA256dc8a420989ba1202962444af51d78c7588b5537aab2b467e7acc30977497c6e8
SHA5120bc462c31da5ec2cc2e48f446af525078fb96cdb8f0cec56c7d17d4a249582bd3340ca2934319b0a08905ad1a92ef23b45de38d733617d7cb492f56f1fc49deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3150c16366d40f46b82d2d7a169e2b4
SHA140a8b423b8d3305e2c34e63192f3e93014068a42
SHA25633d48d8697a193cd5b234c8091c071921cc8ce3c4552cff7ebc498b956526b21
SHA512e9de84fbc88dc2e501bf6c5c09f0c151db0ed53ffa200fd576cae4701ececc10546e9b02d08e7e46a30336392c376668debe7a9d66dd207e8b0816498f1402c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535f319fac15794d12216742d565fe1e5
SHA1c83e12686baa55cd7700e9a4e27d3ac310c9e3a9
SHA2567cdb144dca814a8feb3263d4ba5325f7f179257fa30f08eddb28912b90fbfa2d
SHA5126ce09ebfcc92dbc8a0b1c99986aeb6a57c088429f8212595b389257fe871cac405fa0a44c41656b0bd375dc067c3776cd119d7227df35f0ad6acb57e2782f600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d35261dd5006880589eab9b017b1df9
SHA17cc675b9f63812315eafb12f1c9bfbe34b1e4aa9
SHA256862b2c6125cec5da39dba2dd6fba8948af231f698e32e31d1294cc52b3053bc7
SHA512bcdce899561d3b9184b81fad13f1a80fb43b9f0e1efaff2b11121bd2d74d824d32560339b17e40ec6ec6a284aec81113c1597f26503f766be037a11fc627447d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5082d95f9a49f72a8afc8fb52f9f8a66d
SHA182eae041898fde00bfba79f086ba205adee1636d
SHA256995ef7a51b0655bba5eb50714f9f5cae2b17d675567058c62f9cc9e7ed60b929
SHA512d8eadf30c23a3bcbe84813be8d557963dda228a32cccd33fac2b5f6088d0522a3cd625fd1a4875481d635e7265eee5938e3d3429526121f44232b7c8c4a68968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d779b6c84d8a25d636b8f143f5eb2d6b
SHA1ea4cb03aa793dfecf6ca0b0295650aeede83eb08
SHA2569ca27a59d141c49392ebfd5b4467c057be5b164b33aa8325a7c22802ddfab128
SHA512e2f4e8287e4bc0a710dbff75af99c1bd2f5991db01e47dc4072652ccc67ac37bc764ac596275f2fd77c21912f97e9ea839b3397aa92e6bede75e4347c786beb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c2a0668183af3e0b3e18e8c810fa33d
SHA1d64510a46f70f9f18495c5db517c49f0d170d300
SHA2562b55946b1044a9c63a384312f5318e8b551f37ecf441733aba79c99bc413de48
SHA51287d0b3c95d0b2fa48f628e852dcfc7f08bbc9544c9b1590ea5f5d466c04483a2f66e6216ffba67c08cad8be5b5be38c3bbae1a7a0a4f17cf1d33696f6d8b247f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5683fc8d1bbde5f8e6a9f5c2d6ac46585
SHA12393288a92dd48661e7769ab2dbbb4a6b83f181a
SHA2562135daf0b4689b271b0a1d0d586241d1584b308bc9aadb013ff2728d8eaf6f04
SHA5121e02f69cb8a9eaeffa0b220b92a38128bf914de050d94ae0ef83ea53f75b7338601ce8b8b24a8dbd5930cd5603c447372701b58d6d8ddae12dee600ce2742966
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b