Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
96e8b4e7b0ea207eb3cf54a33335e641_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
96e8b4e7b0ea207eb3cf54a33335e641_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
96e8b4e7b0ea207eb3cf54a33335e641_JaffaCakes118.html
-
Size
460KB
-
MD5
96e8b4e7b0ea207eb3cf54a33335e641
-
SHA1
5ae0690bc9adb5d50ee6e1c8102c51f19cae44ff
-
SHA256
da5ee8a75611a93bc23172444cf84d84379122a1a1bb0b0d5132a9692f9f088e
-
SHA512
a497a2c93686ee418451db33c47fd8b2cc6bd87edbd9bf7aaf380a4c4c3fc82b406898487b277fc24ace89a5f8bd0f5ac40276d99f1f845d68384fa74d2c9c4e
-
SSDEEP
6144:S8sMYod+X3oI+YMsMYod+X3oI+Y8sMYod+X3oI+YLsMYod+X3oI+YQ:L5d+X3M5d+X3s5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA7CD4A1-22DB-11EF-9F86-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423713127" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000604634ca80d6a848896b17f4bfb6b4c70000000002000000000010660000000100002000000090b72b93304701ffd7a3edd923cc2f25a8014b0b8de5d0780d7f11446db68f36000000000e80000000020000200000004ed8b14155796a3bdfbe67773e96f34815308b7da5c2c113180e724d0451213220000000f423962b2471ff69e40e3d9ea495f152e5fc62e7d3cf3786343aa200b7e34ebc40000000178b4c483f9d5f0fd89ee31eac1dbc673f4ce9aaabe14a64e967a90259494e5e26f53ffa247e3459c0d79e6e990ee57ed6a00ac17a80d11eab788345a5845106 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90720293e8b6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 3068 2180 iexplore.exe 28 PID 2180 wrote to memory of 3068 2180 iexplore.exe 28 PID 2180 wrote to memory of 3068 2180 iexplore.exe 28 PID 2180 wrote to memory of 3068 2180 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\96e8b4e7b0ea207eb3cf54a33335e641_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abb32187c2c3a74b6ffcafb908587b9e
SHA1161ef0016168cec729c291922bdb24a4fc91c631
SHA256caf11d46312d9a79bbe5d476f15afaa77d7a90262e9175ae134ae009922a33ba
SHA5123f7a74e199d8dc5b16e2e255ebf52d1e3c9e646e6eedc170bb6aa28b60e45bdc106508846116fc4c84ea2646fe1369019029ce1efe9eac3eee8156ebb378758f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51af84fd0766cb32fb57301e4c8a1f722
SHA1005c38b113c85f5ee5a17e788319b5098fd6906a
SHA256c4a9464765cf4ee8a18c8488ec79662c1aa6e425fe7a5c3fa425fd1ad73feb18
SHA5121b6f5a5b1bbd39b93f5c7b4774e9493fed7faa20e09011c5cf82390b160ced84b00cc0abdca35626723200d6153230e6ae799bd0b8449d43feacb7043bf8297b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54456857bbf69ceef005e1b21f2c4cf1c
SHA19b9ea39e9fd6f3c40690b14b94a8a931c1875f0e
SHA25604005a02522ac1f3b89ff75a061174cb9b410c46bef1db8069c0e9668f41bb9d
SHA51234de9e181573b392fc14a0dd0bca4359b8bb8895569fa48c9e1485605957384c44c3e470fe12dbfb6a9ad9c5e57e36d775eb81593bdaffcc9310d3af8f29dd15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c378203e1554013e82b8d157d7b1bef4
SHA1969fd1dfb76d804f90c202ebcf8d4d6054f5d4ff
SHA25617cbb965969a9497831f8f72266efa2b3243f19382998ecbfd4fb813fa4308b9
SHA512ca94bcd2e684fc5165624b9350cf984261a510da52327a606a454701e804035413f011fb6af5a4c463d43b6208fc5a0b41a43bb51d0a6fe3a165c8814fd7a567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c17aa8d7139438ba2ea3b4428b8309f0
SHA1e7eb1d5c8dbb951e9b97412055afb727a263b93d
SHA2567ed181c40dece3a710ffe9bb60e26b31f648b4463968e3b4ee4203035edc54f4
SHA512cbfb35d36c1363dbcc136ed5cac280fc84841d8db8c3f207a0672f8120d15f8e555f4da9245e80afb5e00d016d7390e0b5eb6c071b3ea2d60f76fc51e9ed5432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557adbb1f80895dd0d2d559d62105cff2
SHA1c4701221a5e9e66bca8d366e4b14b5093d215197
SHA256b92bafeae8c40336b2b21478ec2d6c8b206da491c16ddf2e2a4e74fb22e02724
SHA512354f4d8b00b7b5ff0cac125e325e06a44db380c39436ef3c6977371241d58c97c4a23411c2c971f0bde9145a5db7cf714e8af01f6b72409f29afe10213601488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54298c8c646fc6c3b8ac882016923dce8
SHA1af243fe4e51f1f1237839892e09fe1e72af4601f
SHA2569a2fbf810c18b59dd338feca3d5c47dadd7d82f9eb06652fd46522367db14878
SHA51240bd78545aca16c6dd4f90155c593f953d3f067472f237d6e8e172959e7a8727d23b0f92f9aa687a8e39cf4030c618d11b2a01209f6ba5a648d0083ff5f41bf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b29804b3b11b3220c90c000813552617
SHA1e4c9d155ea5d0270109cf0a24cf2c7962afad23d
SHA256f10ed9e6019b75b547285ebf09b5fd6c0c719838e43d307ae5fa29e766e39dc3
SHA512bc4e0e406a5882f333411e2919567c8b70bc626beb70d1fd13f55a99d90b8464ef3cd0e998066bd587e503f3b0bf18844f2d4507b7d8c25fe6146e33702faef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5153db343c554b0f294f970e59c395e11
SHA13594a418da5b4dd013401d72d235565082414cc7
SHA2569e4e7250fbe55bed6673c9b87aad9acb083540a0e981235f7dddb087c4c8124f
SHA512925a7a238e8fb7f9df79a7eb480604562d9169a12642316f5863458fc808c075b994e2d008d37dbfedd70dd863d09ccc626f994ed3a1a6d10ac558bbc9c3de5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f3609c63d086d24fa0ffa9386ab0134
SHA1472e4b2e4e6dac3eaa205ba82f5695e222231021
SHA256f880dff935123fd867a3d06f949a4934d43f67cbc831ed9bfbcf0ec89a96405a
SHA512a6f1fde94aecceea99a7896c19b419fd763cd3988992c6941a9a9bcfd9695a1749175ba5a8612f308be53e14b952e99429db265850a3989050bc8726cd11b727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55860bdf439a4e1d3d6214654b4f768da
SHA15802d6f2187d8b94b2c2afbebf1ae35a4247c53c
SHA256eda2be32dd41f92487f21948bb4c96a9a39622c8af7a231a05aca897794ad27b
SHA5123a239b0a7ea347e348e730da343830bb42f7c447793ad1b7e73505ab8d5c1760b49c10a1856c4fc34065bcf141e3a9b48e39c6d466c03e59a7aa386457aaa6c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5691af8baf372bb8924fe5b81d61641d9
SHA1c1cf0103ef87fdebe87a7f676247b988df83abd3
SHA2562f0526fb2ea9238d48e39c0add8182e690d3f6fce4b7d153fb89b767d6daf430
SHA5121e89519f7acf7781528e078e3d3f4d431e3e47f214706742a0b0eef7083abf84b2e5581613f524853e1f0eb1756f16b6ef28f41df9b1977181d8583aff0e5e0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f84c6120e4c203a9ad91329d8825efae
SHA17f461cbdd8d469d4fcf63914b742c7b49275e7b7
SHA2560906b7035c56724dc1c9b8bf6b5855a8d894440e67237b754267a84d011ace92
SHA5121740e6f135d2290f4caf9b380278be04e0c81d601990f01f03061011d07e9a3f07d934473a2b25a42a5c1aaa34088d6dd1a7a2a5220faee55e05f406d9e38c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf2a57a857f6cbace8a546b4a76dca6c
SHA1742450c1a5cff1a87b1fb34653dc78bfdbefd15f
SHA2563db0582aa290bf7be48d164758406730628ba18a69ff5e874f158505c818e7de
SHA51262a83bd4a62758786de01d6d301997b653a57735a2f3a4904ce08a53a22c92d6d6b3f5dabe329389c2d68924e6b2e6a502f2c9446ec3c36f372b7fc41a05a072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3bf176dc90e990307ee5973e7a8a468
SHA1cfb067ac43f512ce180ff9a0b10f8e142d939fe6
SHA25616a892183b95231f385a8433e819cd18cc03fe1bdbeb5f978c241e370507140a
SHA5128dab17de051c45652dc92f0338ae4d90af915c38f6c927058faf703c6c4c9ceac2324cc204a42858c567b057fe4a37b3d5872e52200676038b53358cd36aed31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546e204c7f0a429b9513de01b401e27cf
SHA108d187455e13461454c49ad9607f6a79b4cffe0e
SHA2569ef8f33cf10b8f57d8d65d1846290cbe0075173ea8117f24b017d902ce5dbea5
SHA512e394416976cb73f4227c4bb89ea858b83c8b455ab00d9979249b82f7e722d62300b3b3edb1563ca9c0029394630ba4d2f24153989c0e8c0624acd4c002b65bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5833fc75e07948bea3546fe8f2381fbc9
SHA17646b97d52f1a1ecbcb70facf108920e9fbd2612
SHA256bf3bb177b17f513c82f12e2fa5cce127682cd64ca3d1ed21255bc38f808b353d
SHA512bade88f9128f7e05f659d21ceedc9f0f8c66a5d294d31c660c45bf1dae4f9ee546834fd16176845f572ecc700cf182289739735e3ca1732cdeac330fdc177413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9878a9ca6310e937e918f873acf569f
SHA1dc62853ffb5bdb6836793b2a2c5ac29e8fe4bb62
SHA256481d66d53fc7a0810cf931d54ebb1fa9f899372cadd4615d3401845ba937005f
SHA512aa19652aa1867c64c7bb5619fa243a48987e424de105a74c8e2dd538cfd128384071a4c09027f1aadd06c42a99a25060ac6fc481b31fdf1d6dd69888eae5a361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2f135c101f4f22e2788a241f3f0765d
SHA1c6ae464878b73f4d63ae7b5882087fea569d6edc
SHA256012a6270de3e6ac5286c1da9d6678877c5667fb48d4656964f2da22535b631c6
SHA512a7c0f722b12c904e63aac9a2bc0d56b6b9132f177a56cfabbd47b2b083e04bb6d46b0c21fb02c0bc013e006657aa3653241126d7418da50ecc58d5958f9b68a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560d2e799cab938c4674f7d0b3f7b5fe2
SHA1f0fd8b34a8fcaf447c16ede26b2f93293c501b14
SHA256da8bb4339fd374da759e8e7ab71b3bbd6535ff48063f88554694b948a1fa9b2f
SHA512a4b1c662a7f36949a925b17976262b3b665f9b0e8175b9053a0496c24889d5302b50947b369cd333aab0f0d9ec222cd97ecdcf3bb51199f3f5ecbcc3db2de80b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b