Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
97ec400881b26354bc8dc9000a182166_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
97ec400881b26354bc8dc9000a182166_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
97ec400881b26354bc8dc9000a182166_JaffaCakes118.html
-
Size
7KB
-
MD5
97ec400881b26354bc8dc9000a182166
-
SHA1
12fd1fce3415f58ef51369c3a829a462ffc6cc26
-
SHA256
cd23c7a2d0b3cdbec9f4e374ad80ea57acca14d411a1b55224cf2beddea67d18
-
SHA512
7c5ca41f8fb28e871071fff6ddc0bb2f6ffadca97d6c6124ad8c96fc93666cb8eedbefdeec833882119de71dda39b77b5eef730642050c00cd9db4f360a0a569
-
SSDEEP
96:djRgRCoacLFYju1+iws2La/hUJJUO3ERsiAdjvFdifffIQ0P+Wr6cztJMsx:dGCl6rX4W/hCUgiAdjvFUj0WWdtJMi
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7AD509A1-2329-11EF-BB1B-4658C477BD5D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423746520" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000261381eadc4ecb117f15e22ba3119426e0c60edf04cb203e5f71bf32db92fc9e000000000e8000000002000020000000fac29bcd4bb71efa3510916b792c30036fbaa7522f3accb8b8a3832fde0a9b56200000008e1483ce85c35404b51e9732de6ab1a2f66db31db6125face7b7808dedd1697f4000000017e8cbf26fd025badecaf504532bc3e7531e8095cc1ee5782d29092bacccb6eb5f7712890e84a9e8a313dfdcff29bbd57cefb87fe1a2f36c8cfd44a122119a8e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c09e815036b7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1868 iexplore.exe 1868 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2052 1868 iexplore.exe 28 PID 1868 wrote to memory of 2052 1868 iexplore.exe 28 PID 1868 wrote to memory of 2052 1868 iexplore.exe 28 PID 1868 wrote to memory of 2052 1868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\97ec400881b26354bc8dc9000a182166_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546089157504c431da8679252656e2a50
SHA1b4ebada343d1b5efc49dbf44ba74c143a18e1e77
SHA25618b7659ccbb70bd5c3a5e0c739e5f2cd2fbe6526ecab57e38932b66667129cd9
SHA512c55b303c4a5a395bfd99a7361b32e796180e3b533e8a83feaa9285fa825d84ac3aadc6e9e52ad93f2bc490f8e1df425aaf2e2ad9d580a5dbbd738f47c33cb83c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567a85cf0251621704fd6e7a35d2dc386
SHA16f5d10f6bda83a2066db2fbdb2dce983173032bb
SHA25691bb87a44e5b4afbd276e4ab721c6991afb84417adb2957a09568183d12628f9
SHA5120822c0c5c3f1d88faee58e502329e66bf88f1227cf6fe87e1427521120430fa727d6a11b4ccf9b4510432fbb9bcc61e77a0aac35c8ffbc4fcf385e26e808e29e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537914961f727b60552d10ccb7aadbca6
SHA1b8fcd1e8b7ce42a87a6b8c6ef09c8824128a94ee
SHA2565dabd4785536e63dfdbc789ca8e9432f7a92bd36aaca40708130ff8bdae27eed
SHA5122a758313d73795735063b90a22bec45a79418e6ffd57f97cd1a03aa8a7f88c4332e3c9f2edbac05bddd499f5c2c0319060e90285945e83c0278f640c31a71684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c7235b58180c21c735555efdfcd630e
SHA1c6a59765fcb0437dbb4b25c04a9a3194c61abe4f
SHA256c421f4bb0dcb10c0c35f8dfa16e3083cc9f8249e4fc95106ed68d37dc6e294ed
SHA512bba85506750866c36f2ec7f5890e7289eb6ef28db341b572fff24d406d5efea6a88e60f88e63845710e63f963f3b22316196130436fb5a76a856c3a9cb954f26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a30c5ad6e6c34296a71b02f38e995ef
SHA1b0b3b4d3eafc1987cb82d014b42abbcb54d10647
SHA256b6f76ae5fe2ac6628e0232a3b079c267f4a31524968622f3d43a371b7ead726a
SHA512054ed3db7de7176d5f42ec49e90bea0b140d9955f1950532727c71ffabaa331ed847a2333ebd470059b310b3788b122a200bbcb2990832656989f1689d9b783d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df3fa0cc04461255249cf23343ef7add
SHA1a4de95c9948e49e64a806d38d02db11348c882db
SHA256d4423de6b2f658b4c15e7fbc42c20ec271303c0024e48790db0c6ab2f8c97479
SHA5123daa005e16c90612662e00ae0c885df7fa4ee48a705f42acf3f63625300c46d55ee54b405a0a828e543e5210fce724f85a0ded9fca6dbe947d9622c0b69a8ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0652bd03e6d1c686551f27482a44503
SHA189d0fe6ef48a1b0404f05e8da7d426752db25d16
SHA2566d7cb9d6d252a45810c60f6ce7f5b9984213f5fed1cc085d9cb9931d00dbaea8
SHA512f28fa693d97257d865f6c603038c95b2e709cba45d5b03826e44a8b60c0eaf635e5e2df8ddae2886d432d0c914ba5ea7fc630a3c67ab419dd22a5cf3f14860f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc93c2bc403a39b49f8809675985e97
SHA1f3ad8123a71814f1c1da8aff96faf8f422ef89ef
SHA256afaaef0db98ede6e2ea11b830e3f3c19c12ad23908da2156e9adb076b5395476
SHA5122e5fc85617cbb49cd6b54a17b4b30643cb00656c548b15510d0deb85b13dd24bd8bfb7fc3853de6a2e6ccc19ff1b3f474c87d3809af8115df3e78657753d19bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5384c28e33b74b837a52705f9f36abf33
SHA1e00220163dde8979ad7dd90324585f8ff399aad1
SHA25667301c16520d13dedea67f189b060f00f35cb4c73ae4f23c7f44d24bbacceacf
SHA51296ecf4277236faf785b0675e0918fa4d33ddaaec2e5268acc70331ea7b8b09e7b097794f82a95c31976faeb23e0868b25e82a4b4751638d1ae3f01feda04bdb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cb1279ca679cc57a417058263030107
SHA181c433eac7dde42a0b5cf5a8b188d6e2378386ab
SHA2565d40ef4149a178ad1297714b05392ff0ceda04ce5b0e41034fb81d3efc786cf2
SHA512c388853977cee7a58afc90aba44073d5d6151dde56be250715141e5b4d3d7bbd349a89c3652516cd8ce2e7f36b94d23d3dae9e9ad8648e6acb6c31b59d67ca1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56acc7655c8460e4b9b32d02f6b409ac4
SHA1019fee2b4707c87748b1e27cc9cc5654b60e8956
SHA256ef528ae96746d776839e935b9096c3fd79bbc873c90c633361cad38898e912a9
SHA512e6f30d061345c67b98a8bea07787291e72b8728cad3fc2d707034c888cf7a1d7e630bf21f37e7ff825a9c35b99f5ad9a4ede1d9435491fae07b7248c081d23a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55792d1175709aa63d94e03ffc004c7fa
SHA13304ad47e166df640c58a8f04bb3fd5ea1e6ce0b
SHA25613d1ef6d5e8007f5bf3d1b526613e5d1e73dfca3569c12e8bb77a1ce56397b39
SHA51248b9d7f7a37db5d985a3f48026ea7b33a868e4e3955b511c2345a115b1a8bdfb3bc11c2dac9668ba86b2efadd39581803de2ef7297aed9fc0eb7d50857288db1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5649acd8c7de2ac666fa76e0b579d90d4
SHA16161ae1638442330a50d8cc6063d707a3079f4d3
SHA25660d484639778153be436cfc866594775f0640a37f091fb0bbdd09b113f4e809a
SHA512697219cf10694f7e28d399bb000859e49dac214d6f1f556a3d132fe34fc7009aa287ea4f2e89f156e1eae42912d62b267418d78b59da7375670ad6094cd9d6a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b8b10441617566802da28bad479d6e8
SHA11e3890933dbe8b79dfd59784031796efba2af266
SHA2567134e2fbbe1c11e6402855a8e2bf3847d83156c32f7dc4e3b12b5bd75440808f
SHA5120d9b7696b7d91339ef4c735c8506579a2559073a28362932eaea954a3d4e270ed3dfb3e94d6d7cfaa1ced38fbd9b46c29c14d59b049f59eb7aaa22eeae028ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2808c320ead28a157884e38dbff651b
SHA1a47132e3747e9801628ea6bd8c2508aaa22da54d
SHA2560c2d43fddaf806423702a9282d80a6a09f27b797199d44679a184ffc357b7ee8
SHA512482cdfd9ec1cc6398be4897240edc4d8c2bce970a395c9c9f0d20665050720f83fa3b73c059b45d0b6a5bd2dc1f5a894cca87de246337cc3e734b55037027f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535eaa36e3f1e63bd675024ec0b07a765
SHA129b777e1d00468d3bfbdbd6cdf05d5e7ca5c7141
SHA2566b7721c02e2502dd8f6c20aa44b9d601503cccc7a2c6dd0e406a6c5ec94bb0b4
SHA51288b224f98d971282fdbb9c665cfcd73c2e6f96c40d0ab2791f18aa25bec6b81fb84f6fe45bdc786148a1dd12b19dd4a77d13d02c05e7e39dab081c9243b8a84b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a8221a83cc366f89de8389394c809b
SHA197e3ec07815dc73ca350fb523b697caf17e915b0
SHA2567f78341c805e4ea670ebf503c674dce19454e273f70f3a4b00d24e95e7d9ea90
SHA512da232fdc6094569b296244f42bfd0f9116948fe2edd09dac163a18664cb5eeadc53c61dfa41a65446471d4996699bc4d9cff22ac0d1f875e2972976ead6176b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eadd67b9261965aceefa6404797db043
SHA15553a047ef35dcd04296d26a388fd96a8b1d7e6a
SHA2565aec264aaa2030212bde84cf9b52d851e201c417049b4ba834c31e2c81a8eb3c
SHA512c902bccce3cac2a1e65e31f46a1fd36266fde1d2d85535bcf923fe08156b89db34138517b6446299b9b3f36ff67cc26405219d596f9388e1f555253075b36e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5266964a4960f46fe252dacaee82bac36
SHA1ac37323e465f8157c00ff6cce5c48f61266b8095
SHA256a0ddb14779457eb33b838841ff9e2fd06a0628e380e3a75cc1e3fb55b8d8e98d
SHA512b879978373bb8e2ff58cd00682ab16caaf324bb938aeb6d5722d452e8dbdbe2e94998488bcdd279acb81899d4583f5da60f3c394d601226362cb0cdc7510daaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e5d9d901cddca85387459030eea6a34
SHA177943345a7f9e825714f7eeee9186597bd2da97e
SHA2561916fc6e2fd2370995c273be5686f3a2f3410e64f2d6795fb2a127c753e4af84
SHA512d5e02cb6865b0cb1e20482e7b87d90dd0b71625371419e03fb96453c162e09695282f49501647b1d13f2a2c4695da2e7e1e6c08d0eea956ddb9c7e3118078ad9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b