Analysis
-
max time kernel
139s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 09:06
Static task
static1
Behavioral task
behavioral1
Sample
f5aab85beabc8005235914b55058f7da_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f5aab85beabc8005235914b55058f7da_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5aab85beabc8005235914b55058f7da_JaffaCakes118.html
-
Size
182KB
-
MD5
f5aab85beabc8005235914b55058f7da
-
SHA1
604e8f69dcf66e169ff96017f23c448815d885f8
-
SHA256
b9bdb79b39faf10a4176ff7bb24c949f77776487e642425f6254f70fbb974231
-
SHA512
7ea485561f3f0d5a77b0278fd796c8f9255c60969eb478231c5c039400debb2a000e3dbdce5b324b08d19e830a49be01c436baaf39a5b1748ffd626f15ca2834
-
SSDEEP
3072:SmyfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFiM:SjsMYod+X3oI+Yn86/U9jFiM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433417085" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{841B62B1-7B1D-11EF-B190-DEC97E11E4FF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000000b478045950ce33c14b6e30be64c7c36979907af56eeface6958aa0a0c7f572000000000e80000000020000200000009460d25d9cdad74b9d950bc060580a6eb1744b2774149b44073e14c2150fd69a200000002f709bc61629a80abb5669b61aef533c8440dd613e17d4e936b765ad10fcc6734000000029e62eb09e9898c645121b00feec29c486979532b15c7eaf209f2652f6a49c49f9c6d3663337dbf2359ed8841802d1769dbc3c8c8d0cc699004d2d2e58dbc1c1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01b81992a0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 576 IEXPLORE.EXE 576 IEXPLORE.EXE 576 IEXPLORE.EXE 576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 576 2512 iexplore.exe 31 PID 2512 wrote to memory of 576 2512 iexplore.exe 31 PID 2512 wrote to memory of 576 2512 iexplore.exe 31 PID 2512 wrote to memory of 576 2512 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5aab85beabc8005235914b55058f7da_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5422ea8a8f6483f934c409a4e3c06f3c0
SHA11927651e859e0b5fd78532f366cc6b706a136b46
SHA256db723f64619bd9374bc9bd9b4a2c490297bc2d01b0300ab873881e8e7b4a1350
SHA512eda9a9dce242590475d8d1607effc7f3099059c4c312ce309d6bfc4ef7d12b728db825fd4d05abd4974f0f72fd69d4f439f2721be0c2c7035b96f816f06af751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543bc6e4ecf1e197d8223aaa250e89da2
SHA1b3c7315362b5859a35aa3921fb8b172c1b27a200
SHA256ca934b1982ba5c7175808f452e8d9bb3922c5be956134bee66d84b845de12c2a
SHA5128d73faa185968eafaa51ab4d75ec6f20f5d4dac5c6e9d549ced68c5be65b9eae6983f0dad9e6bdd40db9f6d4818814743fd7966f643f70475042b5a66a302741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e56f867721666d79ed676dc24bc37332
SHA1954f642903ab6ca55fc7b9fd57d72571f6fef726
SHA256bc30da53cc3a98dfbda8e7b788c3f54940de9841279b7e91484632071c94ed97
SHA512de033f788f6e15bacbed9b6669326aca07fc701da6c90f68c25d60783cb9cfc1a9ff4d69b0bca9acba24dbc36003eacd06aadc4eb8013c967cfc3ad5ec058f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb11c4f1ebf7ae90a06529d6f0298967
SHA1c242fb50072c20c42aedc6d4fe252d50d945202d
SHA2564380744d9356d713d54c053e48c13fbed465a5a28b400fbf29018bfc17752eee
SHA512f2b41eb85bfebb259a635900089e1410f99ed6ad3722be4b5f8ace276f8b242f80f0c6ce120663956c76b04e8aa253257ac4f16ddca127b10ce5b2d47d632393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5168fe4abea03072b22cee735e7552f3a
SHA17c797eea840340a4f44bfee6c538496e7199605c
SHA2566f9c6f11076ce98ec3d4ce4247e4e92bcb226da6ca7e28993145fa43f4151be8
SHA5124fd65561d4814b825d74ab71d91a2fa248ccb307e424314dfa9070bf8f4a89bd1f42b29c9222a53a14344045d9b458911567a27ce5f723235ba58dc3bcae6eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbc1ef8512d2c7ed5622db4e07c5b9be
SHA183da28ee5ad4752bc93a60e859bc8f197c1ffd78
SHA256840c3cac303df1da19ea95c2bab5146a4e086e5eb9af8f75af61a94653161599
SHA512b1a85149f9bb90e09101ce6e4ae57516741f9f70ee125131c25f5b18cc2e5113b60407bc7e30a96e1ec32d263d1a418902b67778718da9b33f984f053c7d2b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5576106ad818265a2810d9264f1a44a38
SHA15254d7faa93fcfe78858d7afcd25f7887371fd25
SHA256daffa0ada19e8120f6399023a97f56f92731450da7b4683b923e2bfe318036b7
SHA512168fa1f40fe790b422707419bc79617112f1a9a511129f19e5330ef1782dab827ac202da92c9097043bc3998dbac7630a7db38eaf4d026a8c29e41d12bbc3c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564b164b6a5995c1812a60698c5ceda38
SHA1b4913c3c1eb06546aa687d5da0906e586ddb044b
SHA25609ed623e50dc9bfa7931c60ffb1b0ba990cfa687a13547515c6b524f2106d3fd
SHA512585ad85ac00ca5eb8ad269e59189603ecb257eac9fb2f9c36aadc18633597d1681cbbaa020ad5dcbdcad60d6061750fd61169a8825fb60a732361ba4c1a1a47c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590517d4b55f3914c555463733a6fff10
SHA113f3d527e242d2f2373a5092bbe62efe6da507d4
SHA2566f97a7db8eb8ecc3634ada83648de4d9235b0b9c574582e9dc267a72eb8f3d2e
SHA512bca1f73878db045046777f4800fb2cab8ce22934b365ea7059364c5b75c2796c914e1f9242401ea98ae22cefae29ebfdf141855e0f68344e252cc01c0a365a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1c6cc0d1ad3b9c8c8a64d4cd56f2e20
SHA1da3066eca0d745c618de117972603bc3fa312094
SHA256964465900ab7e536fabb72c6b7ca54132e24ddbd92c8c573222c53de20d94caf
SHA51290fcc9daeb8f62ba333f4dd8b766be9b0e0e7f077e05f2f7404c69e16954da8d62d81045f99996034ca1d90255f24a0cf3cd776758c0a9df670525b3ef29d655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579b783ebb64dc147fecfb13e3a6de7c9
SHA193134d617c1b25efd2d71047ca24680e1b589c4c
SHA2560d7fdf4b8e899adfb9506a2ceeaddf7f6f37293ad6ffe9caa477b9de2df36288
SHA512adaf25f2f9fc5b5649b44fe600ca30a85fd653e5f3980d4c4b095dc27449e01645acf3d69a4c297e268c553c2484f225340e195fc4d68b8a53d403ee9bd7d620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533a51c1877acb07d7ed5462fed29ad87
SHA184ea74bb0fae241d328a6d6ac770868706871bf5
SHA2567944b5559e982d82c56e4380c11de8ef80c9903208aeed5bd426736927189862
SHA512a1210473bc9b89cdb562b73f7f019e23c3d9e8100f0d4b24873386179f434b4d02d08ea626341fb6fbc7ad0ff19615a512495ee812b4be8e9d8c56c1ca9474ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc4af302657cb70904bc998004a19532
SHA171ee40fef8e21e75d98dbdaa1502c0eb51a61457
SHA2569cd163bfec05bac20420bf17e80c360e90f404f28ebdb99ca214326328b8922b
SHA51227d7b7cf7a1f1414f18f94ba2e19ad5767f1d31c98c7fdab99e32ef47c0189ee75c0ab5270ac915016571b063018ea50a61eaa794a0c7548f805d313813d2f02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf86afac926e25fe68adfacd47707d76
SHA1f52694506e0ed8b4ecaa3605c21719b324b463c3
SHA256e10e618e7b2a2995406a988c40bd1c010e380e98ff48957d572cc8293b7b9879
SHA5127beb9d4f4380f670ea0ec6fc233c73aef4eaf51b711fb07806e36c80ba2f3b1130cab467b52b82a61a2bc038664eabbd8e6b849c70dc13cf8b4472fa5b15d9b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561357a3e7ae7a10dc18e03863e54bcec
SHA1d00f71dcab1455c933eab460ad0a8f169a6f5fda
SHA2564c90969a7210735da60f6e27d8d47cc0f8b9640db6bb6429e598e2ee35cce2ef
SHA5127a744abfeb8aa627fe702bc64ba3c86b5d3f0774c3a81a142d4eaab6098fe239c184c4bab85bc19af9bf8391c6ac6826fe33b38457d417d99fa6f848a7b7ea73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ffe3804234f39bda095ef7754475e3a
SHA1a2722f0c8d89186df745294040ea7414197da393
SHA256624f64a03817e8a8d1e117a1e044a78589fc5c59b3f923a7f1bc23d44161b83c
SHA51283a5f10002bbf876e56654429b00823ec843df874698ed60f707ede32dbe45e7d8b4605525ceaedf868abc7e5fd4141262377d9f1ca6c0b793e7f1d729bd7caa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5087ed505438e49767136bb92a2556ed6
SHA162b447d56dcd46f6b06c72615cb7e28544a65c74
SHA2566dd4cd1a34d7a9e78691ee0276c5038959b79fcb3834c93bb5c70bb812e5a181
SHA51211c0bd71a2fee904d6735b8928a5769f3ee2c77e370a1f38d19a2a804febe81962e101677ea2292223bd17d695f3cbbad546b864c599d4593af18b7743661f7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52acc49aa0f1a4a62d3d00f41cb64af1e
SHA17da0355d7b42e4ff6c9e1cdae655b6eb0318508a
SHA256deb7ef5ae17643cbe4ec79d7d54228a1bfe5c48f3f7f0c43b664b96e33028ac7
SHA5127627385293354cf43c5de3a6edc687dfbf735a249eccf2a06eab6e8595e52480b78bf3915a11cb48b0e49f1b0979707c33d4d96978c23a10d7ba43b021a1753c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e746cd1624cfc460480795e487a220ff
SHA195f8146ca127bb5e2fc3edde7ef030ab6872b48c
SHA256762924e859c0ee3d08e7c39abed34b7dcd97fb2ed3db22271dd63c5bf00d0354
SHA51285ae10bd95c479ee1cefba0054849ed4d1d8666d193a37779e70ac3c103465e360ed6b10d130e363c180f5bcf4660a537c29c1b21c6ca920f0eefde82351506b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b