Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
a3b990fe360355302928c6611ce19721_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a3b990fe360355302928c6611ce19721_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a3b990fe360355302928c6611ce19721_JaffaCakes118.html
-
Size
461KB
-
MD5
a3b990fe360355302928c6611ce19721
-
SHA1
84fc399fd28ac6309544720a103dbd57adf6ff2a
-
SHA256
ae70e9691624c187c63f2bbd163f8641a22d1a92ce207284aae5fb838bad7675
-
SHA512
a58704b61c1700c56f53d7324b719ad6c5cd25675fad68f4c73f72d2f612ed423312fbe54eab074f8075293bc747614afc88a60f4c9993efa632ff4240796b5e
-
SSDEEP
6144:SFsMYod+X3oI+YUsMYod+X3oI+YksMYod+X3oI+YLsMYod+X3oI+YQ:E5d+X3U5d+X3M5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50420f6744bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E867FB1-2937-11EF-AB3F-D2DB9F9EC2A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000008872399f77f536092f1ae2d15d5922fab7e0ae9d5f6fe4aaa2eec789145ef1a1000000000e8000000002000020000000b9a8584c21975a3280a97c5bdd19e8ffac9e34856e0781af2461450c967724b72000000079fdb1acfffa7353182f2d10c3f31b9683e4d223a8a922343791cdc0260633b04000000028b2147c67163355fdc4bb6da89f22080926c311895c853d1d82afe96f76557619406fbd3a17fcd3c2de544148fc17d58fde1c03e64f2073a56a233b24231ed2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424412273" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1172 iexplore.exe 1172 iexplore.exe 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1172 wrote to memory of 1280 1172 iexplore.exe 28 PID 1172 wrote to memory of 1280 1172 iexplore.exe 28 PID 1172 wrote to memory of 1280 1172 iexplore.exe 28 PID 1172 wrote to memory of 1280 1172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3b990fe360355302928c6611ce19721_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51de9aac24e0f5a94680f8cfa37b4abc1
SHA1786c782307dd684da24babf7f21894c569d1354d
SHA2567402eb5d3f8fddbcbb48005026473809cb9a913268e7a9c3ef273c15f2275b90
SHA512ce8c9ed78c88baaaffc35e793c7ae25400c50d382f46859928c7a239fbd7a0238b92935e424c2f0face70af2736fa2cc3390e720cef4dead8a0482bff91e69c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5020e82c855a528604e90814cbc8ba3ff
SHA198de550249f4c8c8c6cb04f4b74ee913fad9b006
SHA2562748915b7c5e5b91d3c53500f64b2f93f5128265345bbc3d8ebd6431273c922d
SHA512fee225525faedf71b4c072c3583000168a93ff1eae5d6b24a9a63e52037599170f01d513d461de16a9472097ed785101926832bf1e6c60327b79461a681cd3a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ac9b974d1664d273b78a68154ca4a25
SHA1ee91e1365306de7138081dffa751c8957d8987d2
SHA256c523ee7775eb4dcf8178a1cdaa6505df63ad352bb2665f6a160ea74c90368fb6
SHA512115172a679b560b397cb6dbe4c137e9b0b3fa43fab3c4fb1e74023ada88bba2fad3962f0eb86b442932fb2602dd18fb641176c097195f6caa1a448068649726b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea093c885bfbe7c3ac9b1843c2fa53d3
SHA1d2199fc704a4ab1e5bfae70c497f6f7e873f1fce
SHA256b870cc97c88af9c028a34d58f06293f77b17d339094eefe684531adc4a109d5c
SHA51291cae7ea46773fb87e567a3aa63d5cfde953dda0caec2f340d7967ef7dcbdbf87f67235c2b10171aec6db7fc1431dbffa159dd603a387fa18303e6157eeb96a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52240f2f2f827bee31841f91303a27509
SHA18903c972354c36a44e2b546665f80e0052427ae9
SHA25605194c36b34e55bb9ed7a81a1209e3a34d24312822ddc1cb70e0caff8ad634e5
SHA5128d1b3b93e2235e2ed6b52626b604b775b0c7206f9920efaa189676836870e3984763350c77a1e9862a696bc260c7d8f00ebf632559bd7e704dfcfcd5c5c5e858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50318f64b6dc124db0263cfbacc893cf2
SHA1f3703f10c8b72375db3431dd0bcd8e13c5f628c6
SHA256cd92ec7a0fe136d828c0abe50dd059b20a3b9f8713649687f0d27e07476b1d46
SHA51226941407b574044ed4fa88c47e3eaeef34cfaeb5b2f740711fdb992a7180673934ab5783db2bc37b24ce23fd592274b22e8aff59dc83f6475cb2ce124cae4b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579095425956f38fa67f1abbb5a3d3f63
SHA1de6bc3f132893c1475cd1e2c1db1218e4a8d8533
SHA2563be77d81c2fea3aee4437517c057eda2858264499c0a06dea840c57499dba392
SHA5127ccdb5d46a651ee66ce5b187190cbf036c77cd05d682bd29f4be1a70766f49e1b9dacd507c9f570e1646cb457cad9cf505bf12861bd1b56fcf220567c0ba96ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0728f4002673ca1075adfd6d30dd9de
SHA1b3e993bdb337df99b13ca1071daffd10ecf48f96
SHA2567fbae6727400be8de02f79c95b1b0a812a5b4de63d87629dd84c5b7e606c6438
SHA5129f75b10d10934cd5e4a5cb4ab53262389cbed19c554e21454a781525d380b526d3b34f3b4d8c44e689c5e5875af268796792427133fc9d81a2673a8124714704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ed259fe051abef808ce9e90ae86d748
SHA14232db07780a14fde75d14575c6b4b616dec247f
SHA256a6535d94a5fa57efcf13530f9d31d13b5d1467d82fa43006694bcde30eea7bda
SHA5120a7cb981547209b5467a8d4aba073ae5792a145141e40f42c257d37b03feacec1a9437c05c31d83335c7d1642f64b9ff48304c4699e00d700754aa31b56aa76e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c76ae6e25c1cb16aa0a49e0eabbb1653
SHA17d289e7bc929b319865fe50a270a086672221160
SHA2561e802125a88d41a09639144e07a6eb3685aae32cde822a1f8da278fd4d546320
SHA51225b67d8914eb18ef630536f478fdce1e2c514f99f6e462ccfb5f3605f026cd8203407cf2f9a7f2a3976f3a66b5effa4c54f1a4ce160b6dfac82fa9d5cbe92cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d558c7dd4218aff0becd51ad4a447bc6
SHA1b1cac4a91d3eae465028d8a03facd3700daee030
SHA25634a610fcd2741b6edab06dad43bcba18bec5dba614c9a45037eee1e2194a7958
SHA512825c6459ef9e7c7fb696c231691de1aa76b6d51de1e98733de85eb925f9b45054a2fc8a545b34a33b1a22fdef374fbc899b648e5023f5c064c0bd06379f374c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5900647539e74075a54264fe0529b23f8
SHA12926546d6810069953b3e07edd864b965bd77064
SHA256ab85e2c64fb7cabc1c0428ceb4a952688bd482aceb3d20f8a84554141ee2e752
SHA51206725f1f18aa3e1698cd10d7a869ad04cb4d7f0003ebbbb5885fda43abdb7e8218819277843945e596a88deaa098ca33e871d75cbc910cd652e41e7a246f2cf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac8aba22730f0bf6b1ede54c99a9ed33
SHA152903facce5d1da77b36ea828378fdb50e6a3b6a
SHA256e47fb4c31cc34deadbf98a9fbca54d0625cc1f5d3ccf0b3faa5fa470dff4faa3
SHA512427310ba314645416403525dfba24bfd4319bb3b3135d214615e8992271d66606a54f0b500d5181584bd9233c79a211cd6b0c069a8f7cd43517f27ea21b18bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5659fea0c02c2ed29bd1826ccd9c67d56
SHA19571e3fe0ad2f5252179443d6e8510a4fd467395
SHA25627c4c65771a3b0efa1d03b094991211be6a08b72eeb2f49fa5f71d5ec4f83d6a
SHA512e488f912fe6d531afc5bce96751108271c15940eca98a6c7a14180d4cca074c2762279930708bfb296eb5ca861def3a2701a6f242596dd8707da469339ca84c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb6c05295c1c45a58f1c9d75bc4e960f
SHA111bcc5a9a4d8e3943bae9c4c6513c7b8491dd6e3
SHA256e6d46712295c425f445aaef1c87cbbd1c2b523dae52e55adcbb1ce770a0adf00
SHA5122aef880094553ca9a4d8d34328277064a50b45ada44f5d324e9edc34678510fea74a38343f6bebe2d850cd7370c89c9277c1694a7f6624dbb004ce098e30a65a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562a9c76123c8afe4482eb955a19de9a3
SHA1624ea0f1d3eeb0c39603fa3ad37df515c45bf8db
SHA256623d7dce24f049d04ade392d814412f511b7550e15e14f52f7c4e93e193be93f
SHA51247e32da13692ee837bf9daef43834e76af1d937f78bc9a51130256cadd6114de2cdfba9c11574e2f280dae9c9b5dcc94fe017eeb9494f0b0d1af986d464751b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5001cdc101adc450ad7304a17e21c043b
SHA1c270cd5217ebb42269b3a5b72a3b85afb8a21802
SHA256b89412d12c3a2e0c32926f3cb6164f48d9879af9a8917b6da91fe7fce0c36337
SHA5120caec5a58d8582bb22065eddf533b27c40ff40a516396d9c4097fc1340e8c1942fe52be05b855f6b572d6fd475c69e3cc85e3b2b5df874406cefb1d10519615f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae718085ffcadbef7b0bc74988de6c0
SHA1302855b51549d74c35b0d163ed2134167db8c546
SHA2560f4d1cf4d873bef7170d404d9e8c8bc197f657e8d18a4d1b2a4d9c94392ab7bc
SHA5128f8f21bf6294dfddd6a0c654260009420c4187b691e598f7b35ef4aaa008dadf71882131b41a37da148558ea6ff1eb5ab665f417f0114dcbc113958b1173cdc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab77295c44b641ec0e93174be84105d8
SHA1dd68ebc80c094b1e3ad1767c88fb8f4b5402b571
SHA25622bd9559d0c0310fcb439bf70120e2cef9e3b043dd0e8235e99486cc9d9832c9
SHA5128e0dca3d139c972b8f130b89c23a3c68c5ee8b760629ed75d74a132c4e48b82fbefce73c801a6895ffa5fa4c1c7162d22f5b518d39de49c728e865561a1ee84e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb71b87d50cfdd545d3832066aba7fc7
SHA17475615ce8a7ddc4dd90502cd3879225e3658ba8
SHA2562b515b3727983a5aa4382d1a990ff8eb7089f8ce0eb3c3e0561920d6274f19f5
SHA512de407ebcb5ee348a9ffa2cf39f3ed078ab64dc6fa97616b838af417e0cd837135d696d847814953bbd2e12950bc12a64fd0e64f66a8536834cb46cfba6b6897e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6ed9702516774b07551024665751464
SHA1c4a0420f4daae7d0a817b65d0a6c63db6f357c16
SHA256a3e56c1e37b7204dab9270df680c226e7b604129ebe9ec2f5785aa40f8b45910
SHA512fef8b1727676ec0a69bb31736563ac15e486016e02fdfec0571a4940d002892b09859d7a6ea7416cb15e3b82fecf34912696d5d9be6adf8c3d0b5e0f9e426957
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b