Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 08:41
Static task
static1
Behavioral task
behavioral1
Sample
9431d0120b8006fbee67706077173385_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9431d0120b8006fbee67706077173385_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9431d0120b8006fbee67706077173385_JaffaCakes118.html
-
Size
19KB
-
MD5
9431d0120b8006fbee67706077173385
-
SHA1
4a9ffc1a75d304ba058f8ac908eb8ca3723f8ff1
-
SHA256
e7b4e261d349a5e5bc2dc7f54b6bb842bef9ca4e494d99b2fea111a503211d2b
-
SHA512
42a5383d750ff682b7325cb14c884d2cc63dad614f9f6b9905a89bb40276eb9a83e3871efcd8b034d7afb5109350a003b2f7019cb843ac0da9a7c309f1a5aa5d
-
SSDEEP
192:CyiFG/9vKAB6H6tdEVSNpETT6AxL5lf2t63QXqU4Z1pNwAXiBmnd4mgNMb4ZEp+u:CyiQE2CpfZ3QXqJ5Mhu1P
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E6846D1-224E-11EF-BEEC-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008d54378691616d45a929d881d0b4b58f000000000200000000001066000000010000200000006759a7e8c5fa83a67536fa5f739a0abbe5991f9023c029f8dc865a64734e4915000000000e800000000200002000000096aea3226d84360ea076213d862d1c2e724f4096a6659d93e6ea9c640cd78ca82000000011ac3efb025eeb3967f9fce0d48bf520a5012de39d05549fdeb1141a6411001440000000178c278b86e803f8b33590868f018e3c27ba12eefaa92b29331571466c903400ed2dc32d26c6302330b2ef75520ed6ac2db28a5016887a3c20daac851b06898c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423652333" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 205544035bb6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2332 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2332 1924 iexplore.exe 28 PID 1924 wrote to memory of 2332 1924 iexplore.exe 28 PID 1924 wrote to memory of 2332 1924 iexplore.exe 28 PID 1924 wrote to memory of 2332 1924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9431d0120b8006fbee67706077173385_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509001be67ed1c22a29f2f288b09a58df
SHA17b71c6943b759df1ab3b0efff2fb3f685dc7d5c9
SHA2568df631fa0956fc560164f9cbc7efa1bf52c38f5f82f7e23c89618caf51fd8348
SHA512d528f08756e6fb72cb295390116dfc89cce484d3e0f04544e3aa5672e8b008d81d0861f17ca412cfde48f2f3efc09b3ab5681ec3857f157b277b8eaf36ff7417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5919b9d80cb91b0ecf81744577bc14c50
SHA11b5b5dc9f00c7c5574469eb24984ec943bc25119
SHA256273a206ca476262d422c93fef70add71f0166d86f85235396ec502d82356b4db
SHA512bf45001663eb708a95f6eef4e1234470ea43f05c28d821f27938a684dc5e2b7e6e1c20090ede4cb6d4bfeaced81542c343439043284c58c797def4f3691e1365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551d419ce743845fce36b0f7b3bd1be41
SHA14e1672653b67523bb02a8a73aca95defc80b84fe
SHA25664b87e3f79a10320e2f10f5cb5b0c28b2314a6246731f4ddfd1897f2d4129e4d
SHA512f4fe59286ef9736c85fbc90e5fa95377abe75a580023e20f74f7f2915de7c3ada8a73193a9061dba992aad63028f2993e2a4040bd294c1b9e5f8a24b557ec815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb130d56b635f82e98bc3caba5ce0062
SHA17c622918c68c29e9c6b4cb7ed16f3310634128b8
SHA256a985cddf013c4b04179263cb7186b7999d15cc7187eaf4765573d8af1d8bfe89
SHA512de5f365ad32c2a0ecb0fb9ff0fd7a6f0aab129f8ccea77c9eaa028a965623df5627b99e9465c236ad665e1c4db885d1415566ec1119610b3d0158b95c81bd9cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573cd271297cddd977cdf3b08f5a47ef4
SHA1d56ecc739a93a549ce69210618472e5e3079c9e9
SHA256e1e9a0bac7fc493185fa904bf6c68140a5b29814ad7c47d6b3db1359c76ab99d
SHA51288a898ea79bba6b561b6395dbff92d96f08bf7520f823f0f00cfe7beb21fa1a89992efdaabe781f18fb9d1481ab3cf16ecfb79701636d1c3f7569f6593ccab9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2e165b84bd5d8e1c88a7e2b9e503f11
SHA11f3cffb9ea5c704b807e56ecc8268bfec67e5f46
SHA25675746796bd50121e4ade0c227fbf66bc080b3a9a57e7893fb726729f68764828
SHA512ab200bf48b2519f05d4343ea2db5cad7963bd7b0dcec6e7bf5a5d3d5059fee1ba0aaf536d537e4067844247c3013919f6d9928e85311773fd6471295827d24ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579791a1382f282b9364e4fbc2cb2b212
SHA1e50e13c75e62af64be671812a0ca470d475e0f31
SHA256d730922da607666faf84b3f8a9f80fd1024f92dcc6b6a3bfe20c92525d910074
SHA5123a1f583fcb99117e7443adef190d43a5689445282b65bbf4e31e96eceb271f8d0784117ebb7e7b2d591fac985ec93ec0617d6bd1c8d3c628162e38dadb15067f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b567b332b90c8144a9f57c527a70dba
SHA1907e1e744c4a32d39ab8c086293c3612ba4a2453
SHA256f7dd32dcbfea6cd1f6c75c07f46e34b42b5908b8672ffc98a9af5e5103076a13
SHA512edbc9463f3a78307322479bc9202478ccbbd3516a38f67acf3330ae17349c41617c5574fbb42c5e0494da1ce90595f8bb061356949709211dabe92cee4ff726f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e3645b1af223fe65541859d47a630b
SHA185c828ce4d33fe7d0b3efbb9e540d40e3dc13408
SHA2565a06357ce627977eba21044d29f4ceefcf27bd6e7b07c19249f8bb4069cf1f24
SHA512a75a970132f2dc589e170a31714cc40f5b3d14cbc87ea3de305391e30d6de1259a3869e4cf08db2df947a68850753bc3ad69522c26e03b353cc80838fe62abd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590c2cabf136d3eb2a10e430603cadc57
SHA114eab32af893be80defc2b70ff0a0974155aa664
SHA25624b39f9145305da1abe21e84a3737ad9dd5a2a080ba03994a9b4c002aa143c95
SHA512dae0797908bdc5030f1a0ef23c1d0a9adaf1ca82bc1215609d4f599ae6f9efc7916b8d8d041d880079dbe2cb9718e0cfe7732f2f832911087e030230283a20c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c88a38c2ae20e9628333ee0287514cb7
SHA17c779a61c0f8b35d9aeec9f60dea479c5a28ca76
SHA25611ac2516e13b774f38808c47897e87e303549085a906a26f9dd86446e94d2fb3
SHA512f821d8d8d7bcc780b273fb4118e523a20401453a7b47c7300554e234cf753372b144ad3d8dba98b7230fe66e35954c790cc4aaf9e12f5f90c8d80177ca3f16c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b18cc8d780385255c6b01a9a59502f2
SHA1896ef1f514cec0f459f8718a2a13d66d58f75473
SHA2569437628f347588761fdcb1ae05a7cd7e6d1c15429c157711cf1e56a028371e08
SHA512483d321225164aa0ee4bda643e0e36049cc2910c57ed3dcc3af53271ebcc2305b56281b31b65e5daed4ebcfa3ec7eb6186b67d6bf19d298e9cf97c4d2778a44c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9f18ef349d431480e033b6e39534b94
SHA10e8062b5f696e38e9fe4a01ca88b0baed16bce11
SHA2562c0c858496263b4e7c3b24019b6360ec94931c4a6537205e7a38d7151e117cd0
SHA512c55b5c4ea603dbf4a445e87e3accbba8816b97557c22b1e665b55b223f11e8f376a78af5bf4ac54a6237bbd5bc8fb24780b2fd4692ceba8ab0708fb6f0810f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfebc79c7f9bc9822cb488903ee76735
SHA1119fb7ee131d33e6f31b4438975bee62ce0c559d
SHA2560a8b82573ae65b5c6803e1fa20cacbffd602db4f4fd2ba2efbb000fd87fd3043
SHA51296563f61df325f83907f361da24479c2e59e7e8cb9b250b0fc842b06eb415ad497a3a130b15c1b0e4f004273609acbd3e106845546e7303d89b0552696d9e26c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa3e8d3b2cfa97149c7e0db734483fb4
SHA1bbbf9b13cf004c78f723c31de299e1a6d073375b
SHA256a300292cdf7848ec89bb2c526127f7b1db52fa7815cbba5b4d20a41130082a94
SHA5125ad026ec40e1ee8b4b99fb3e68e6ec608a078f2248fce5b1d0a158176a8c5bbc2767ab32d9d52ce1108e4f754d6f02e9d0cd486d054edb445376bb613b798e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533efe3ca62b1a94035b8d8c7d721d310
SHA17e2eeec45b3cad90e7a89e186e83e9ac66ddbdee
SHA25605b476694c5969994b19ea43b49b7ef93951cea62a0c97a30e5e638aa27a30c1
SHA512383cfa75bf9b8396f2667d84356c451eb3b2c29fe98cae25575dccf7a92ccd7c623e2dbbff01ff7eae2484f3f9b3de62413b0b373e3cca5b7dbc1f60db7bbd57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a75728a5753d9c64de62cdc2ef09ffe3
SHA170f71534947966f9c92f97ca116f5101bda1f6c1
SHA256d0017b4bcd0ef8c4bae20a3592072018668a00450e95250d084d275babe7f5e7
SHA5123edff9f15bc78a10059db4b922eab101f517200727d73859d543e1d0373108d737735c2539441e4336a51b667af8943d80173f05b2584a1b22a460bccf708522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52423c7a5dbca69905ffcca45a013afb6
SHA1a7ec240460cb19326fe2f74173c51412347c6716
SHA2564520cb6f793251584a6a03e7060c0faa3f85118fec3a55731071e67e695e1ec5
SHA512624013488b754ba71c9fa7efb76f1f519af84357a990b349c816f45860bdd246394cc33c1fd65653073870f21f9de1ff0e7cfa761209c965367664deeb666949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f302e3a5e06cfc844d52caf59af09bde
SHA1d48ea4eedc578274f36eeb300375523d173005a7
SHA256445fe4a03e1a0e2fac6b32ef956f7d43a44f883a534ec42ea78441ee69afb281
SHA5123315435b2ce284c6c531f408d9ad05193a184600464c7d2ff0016c233809d4e5528847b6bd3517e939e4d049afbac9a5c4d78f4e9fab1140f778674c86b8ab65
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\px[2].js
Filesize346B
MD5f84f931c0dd37448e03f0dabf4e4ca9f
SHA19c2c50edcf576453ccc07bf65668bd23c76e8663
SHA2565c1d5fd46a88611c31ecbb8ffc1142a7e74ec7fb7d72bd3891131c880ef3f584
SHA512afc3089d932fb030e932bf6414ac05681771051dd51d164f09635ca09cbd8525a52879524b6aa24e972e7766ddf529484cc1ec416de8b61255435a89ba781f8c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b