Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
2353df6da317acb81653c92b35e4fdb4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2353df6da317acb81653c92b35e4fdb4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2353df6da317acb81653c92b35e4fdb4_JaffaCakes118.html
-
Size
53KB
-
MD5
2353df6da317acb81653c92b35e4fdb4
-
SHA1
0cec756a9ce4b1f338bed28f97cc77d5ee095f5a
-
SHA256
1ddc0d836881578c6910f58adda7cc9b977df099df61069931e5af484b6159c3
-
SHA512
e0cbb7217177b738b91f8b6160e239cbb800a32a5a0e26060e861146cde367b4c4cec83eb21debeab20b680d513d1c00548635373e073102610eaa5ef2aa80a9
-
SSDEEP
1536:CkgUiIakTqGivi+PyUbrunlY6o63Nj+q5VyvR0w2AzTICbb8ob8/t9M/dNwIUEDK:CkgUiIakTqGivi+PyUbrunlY6o63Nj+O
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003ceb209f2a9dc747bfa33d426dc7408c00000000020000000000106600000001000020000000ac95373c53f47cedf69988fa83e25ddcdc4c4ee2bb3c5f2713943a135cad832b000000000e80000000020000200000005d4a786261bd7e76fce1c3e6e0f70b53f7ffc56de960250daef1653cf5e82ab62000000041fc367137406f7c06b4af69843b7a3484a6d14a5e124158d73328bcb0a23d3240000000834eb873b5e44305d2a722f5be45a876177806007b4b2141703a88bddfa6176ded636506ae21e705a1bdbc8b2a7794fd97e6e28e4242137d1556103da85509b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{999AE021-3969-11EF-9034-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426192986" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10c4506f76cdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 3060 2420 iexplore.exe 28 PID 2420 wrote to memory of 3060 2420 iexplore.exe 28 PID 2420 wrote to memory of 3060 2420 iexplore.exe 28 PID 2420 wrote to memory of 3060 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2353df6da317acb81653c92b35e4fdb4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5381feb42c5e766c22944e45ee39d67d8
SHA1a0b17640e6915e91e50a4a7e0e59279388f8e637
SHA2567b08c04263e493cf30afdf82392532504fe39a2a14ec7a5de0426feca4d73b1e
SHA512f0d734adb91b95d30e68eb921196e1076a67bec48dd5d9bf11184a069adf41a0725b1d0774bc61db27950608ca6cb732e766d5767de5512a5daff1ab7978a5c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d8aab7f37c4885d720d98e7149a7f5c
SHA1c0a26d546b8684b22cfb15f38fb79d3a2037e7aa
SHA2566a615379cc3980736578c949437c3bcd110735766bcda5477955bf0c7c8b64a4
SHA51205cdb288ce34d0c0bf34408c7d797c09b83da0f0496cdd94380f0ba06b33b6eaa556a9f67f863f9fa518f0aab24649059274434b36ff9eb632ab6627526f06d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571251bef6f1d66e14da458d027edd35a
SHA1afdfa31c9a1a5e981bb3137fe82a1db237880447
SHA256b86d6733152508ff210dab78ae55cb68dbf4cbb4ab72bdaffa6a23eb575e76f3
SHA5120806e744e92c5402b8b74b16b900d2e2e227adbb5644ea8652d906276ccbe74df435399b32e7133f1896294a37f5301c1af34c10a9f4b553d408f0ff5deba810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d9a6a55bf1cb47b250dbbf81f992b79
SHA1356464bd04ed0264de68648111d6eb5d5af21c23
SHA25650c67f598ca53f4cdb732d39049c5dda6f5b4f2dcd361cb6f76a58d3000845ad
SHA512b5f037fc2089eab9f3b18b47a5649fa68b71667311f4a84e3ebf6cd68de8a4109f8aa19343a22a454bdf04fe7a82245e4abcb4e9ae3b0c44195930307dc7e51d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e34014c27512c43c03f5cd87a16f28fc
SHA1b5de4ad1cec885f556329a99a05e8274514ccf0d
SHA25643c4ade18657dd27ca4e64f895ac9a0634126412a1b32c4f9a58cf21564b8230
SHA512ab691b9c0ea18eb1822e3f14e46c14932f5124ad24a59b7a3257bc7a49ba097957e76542b42de981bdb0ca35ee7d839ce18e53e41585328035f02634a2b63fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e725a4df63a74a8bd7a222c27f31f2
SHA1f16290b24f04e710486163005ee332c8d97f297d
SHA256f0af871aeff17af4ec00935893ee600bfbd769e3a0309cb865130f128ff7c848
SHA512f1b4baf8113af07d487027ffc153d65ba4a335861ae4982e0bd83a0ce2cf22d7e69435a1b3883e06129010efc0806126ec1d338c8732bed5b25a0a5801c378d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5822bc69a68b47141c946257001223dee
SHA1d7823e1644a0eef75456421faac4ce6486639a8a
SHA256d86a2dc2d4ab127f063111f8cb63bd511fc8c5e1dd58c3dc6b48f3e07c70343f
SHA51228408719aeb5271c7f6e51f888ccc38bfef35a9322d189ae78bf58a74d22a2da21430d6caa4cd1a0dcfe48b2e5b115f37b315f2fef285897e2b8576c09448222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593bf5d41ba376b34c5fe670244a4b31c
SHA1a6c9ba4762c8c6c6b37f81c86f47865420631ee5
SHA256f6bb67bbbbdd95ea505823b9c48070c50bf0573cd69cc63cadc2a33139d3e26e
SHA512efa14c3aa7a853fd99fe2d469de1904e84e0bce474e59c0d2d73db0a1d4d1419b7d2cc8f2ff6122070e27213e06f44e34e0ee946cddf338b5664165e5fb7de32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513bc96ef076120d587d24d4520657410
SHA14dd12d5a4a5a1a2f1e529873d15cc942189ea5b8
SHA2561b3de3a782f7aa80be2ef3ef60df9c6868ca46dadc8bd1e0677bb9525fc13dd8
SHA5123edae7bd1133133421bbe691ff4428a27689a9db652a88ca5b7743596629bfcc57fb138a808f5dc084c101119b6cf5cb1c3a783c6900d439c85e32fed93cbd13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556c5e5937e5b029f0ced337c3c6b90f9
SHA1d5afbbece8f3038123b48167aea2ac11b83fc3ea
SHA25655c2e404f0479ac85fe0c7eeb0990d3dddeafdcde90887b78b3c80a7a352400d
SHA512824e200690e16e151465852e931802ff9aab2692dbba384d275fc8bfab353dd65b709c3851dfe3a5841188aa6dc187c6f955b8b3f5ddb294fcd3d73254af5c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517998180ef11277e2d465abd27d0c1e5
SHA1cd24ec1b542546feb7b57b67f0e1db81febdf7f9
SHA2567ab07770032f29a50172883dd64bc0f399e6ab3d14e13b1fb157a27b24b8d55f
SHA51292fd3d3a1f36f871605e61349522bfdf6517f484e6db0747b3c21053984f65773c6f75104a247ffa28c786b9a5a21d0035c0c3e5ae0ca2ff4b3aede15172645b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dca024c591c33fa55efe8e461ab5b54a
SHA1d3dc8e8164b65df1906d7b7024599074b95d8d30
SHA256a96ab0ba6dbe7805245c27d58cc9b060e8de90a4c66c2d716c33038ddee0d586
SHA5128ab16ccd7f77b0dc2d12852f715f8c8d4c963d6cce9e7bcff21b51d79e94aff59561413367ba1c55ac430bba1995a337ced64cfb91603baadf0af31085a1c674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da5e58534c90b88270d830caba3fa124
SHA1111955c5701bb33467b4cc1779a8ef2990fdf85d
SHA256ee7a3a689900462f914af609c5f8f9daf7e6e359d9831a739b79185ea8703b54
SHA512e06487d66089ee35cc084efa14c28480dcface2d4c191253e933ec123b0df0ccf664299093a21a5142733470f2a6ed3a8d0b0c308b7a83a81b5b4df318cb312c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e748fe47c4680961161f20212cfa4222
SHA12bc9a68c5c55e64730491b0e8099259f5d77c5f2
SHA256c58a322884b935e7e6efcff2bfefdb33d166410df622c4126a4893be41a8a645
SHA5120d10a0f583f5bb10eb8f636d5d64da813b7bd3fb566b78951f483b72485b76dbce68e580d108c5ffd677cb587d6f92e307994843685f6ac7c1b7f77d36d617b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eb1a0397d99eaab26ed75e890edf2d4
SHA14b54fc1bc758947a642c3ca74a0e9eb255319999
SHA256baf58877cdb33f09e1010d242b40b7da5ccc44d047d07d1bc63bdc9235930624
SHA5124bc3598f0639a567a4fcd21f93c411d050e9d9ab16c6da9d90cadba2719e2daa8b0a657e0f8fd55dc5b5c767fa84e47258ac216648c64846d3ea77216465782d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524a652b81071ff1c42281c0bfcbf9196
SHA1d50d5899543e016390d0c6443c60c3bbc1709f0a
SHA25680b39fdcdcf178c0117f173955e3695013747636fe2104ebd872aa8a0cf473d9
SHA51280e4eab443a159c791dbe2bed7e35bef581f0ebd929906f114935d44ed2aca8330cdf1fe711f6b218f43901d7254a102013ff397162f93ee49b70e7083f50a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597096eb4f6ea6575d5ad3fd8f1884e5a
SHA1c6bb27323b77db92679d33dc166db9c0a7dcaa57
SHA2566e672f0463313c8261b1d8442cae68e4dd11bf0f68c539b90d4be6e8256d7777
SHA512f5bfa5daf9f054191281813f688f73d2036b1c15b2ebce1a83dfb0169741e467a616c4cd72c7e4665b5a65bba386bb8feba30f7c16124de3bb5f8c4f68952bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567c89a1b8b256841f837ad0c24bc8a5d
SHA1fed1bca07e764e27504ac054119f4ca9cf77b977
SHA2564950e54eb55e38be5158d7c24ca45be96124a626ecef2e8aff884d95514360b7
SHA51204be88d1a3271a85a3bda09246922a2671f98cee3b658a60ca39b22e886460e4d151cf38d1035d6dac38c06a8c7fb23a2ccf1b34127d24dfcd8f67f32db19ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532079391ac6a82a48c1ad4cdf0966ebb
SHA14a2cf50f425e6a038330877b52a6f960d829a409
SHA25690af4ae423bca49b31b75311e1982d412d015aa11b3ca188d09de6c99d184e40
SHA512e5309df107b858e30e434e1ab7cd05546b80a9c6ba1cfa1bdb9c9d095eedf390954942c204e1fee7b2d288b8e90df2e5de8431147a3a4e725957b8ca0dfb4f09
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b