Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
85d9a91c59358f161ad22bc5620cca3a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
85d9a91c59358f161ad22bc5620cca3a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
85d9a91c59358f161ad22bc5620cca3a_JaffaCakes118.html
-
Size
10KB
-
MD5
85d9a91c59358f161ad22bc5620cca3a
-
SHA1
c955a4e0c3c2c439488bde715ee3b35d02f35278
-
SHA256
e8df3b5c979ccf89139ba0bfc198afa7a22c342bcc41695170f21861f331c68f
-
SHA512
5bb2982242c2f849efa0018c548b47027fa0db34cabd091d2b4fdece6dc826a12bff562ffbf5318466525d78fb66b2116a6a7ae4c7b26500fecdecb06044405c
-
SSDEEP
192:M0LIClsrdZicJUjYpziX7n+MS+TJfJVT7RSoRQC2PtVzwp:M0LIClshZZJUMIX7+MS+khzwp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429450502" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17D3D9C1-570A-11EF-B707-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000022fa387256541e1f899d2895ebd0c71ca97e8a3f2dceb5afa649326da53e6548000000000e8000000002000020000000c6b4a757735b8b7d55630b6ef9fb00f062f74e7de27564d0de6b9a28ad28787f900000008315c8795e566536c69f7686607f78f5ff2ed6bab494be67116cdf7d9b83393b1d21d0cb4b762b5c4a738ff537d908c9de8980c89af7c838ac9729d8455670e9a5161e14ba4845e7f0c0c0f7529b8ed8ad7f01be949096d03f47c3716ce35186c3aa65ac14a9ff007793c035e7868e62332d221643cab5cdcc904b06451117e256c52ace905cd872ab4195519031d5cf400000006ef0e265e4ed8a26946e6bc76ff7167bd4b6778c2341f246ac208bc07870d47af3fb4d6c5f677f35c8f0546ffeb84884ce5f18bfe292db2e45816cb26e2002b8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000fee3b43df1e7618c40fd2ede86cdf08a460fc5e41c257213cca82791712cdb0f000000000e800000000200002000000091d70d6863f4b7d409050d4cdeddacb6b054b0c4f05b08494e276ef37983c5ef200000001af825abde36d88dc4010499fea64c1c44b5cdda519e29d19c755f3409c059d5400000005859442df24c61d65a29ce2f07256aad3d4007afb46a058d1ab140eb5ac8d62c5628e079d247827b93c52e378b0e054e893fa2136112ff0760b0d2d493e8729a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102eb6f016ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2240 2068 iexplore.exe 31 PID 2068 wrote to memory of 2240 2068 iexplore.exe 31 PID 2068 wrote to memory of 2240 2068 iexplore.exe 31 PID 2068 wrote to memory of 2240 2068 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\85d9a91c59358f161ad22bc5620cca3a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2ca97b2de2ebda1088bb65824c61973
SHA15cdfef839b05fe6edb312622b9ca83474d062dc5
SHA256dff32c24741f7614ac18cae17d8fdc7a50a362705cf469b2bb0aaf06b3da4bd9
SHA5126ab12423c8461497ba284ed0602d587a5aed9fa7dc72ac9dfd6831f2e7b18fc8cc17065550309e6ec3ca163cc9c8a967267af0faf013b1b6ebd99ccaeeefe40b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556f5a3d8df37269f6fb2013b36c808f8
SHA1d56849c5fa10a6841700184afe360ac2912b0de3
SHA2565984446488f4f85606747e1e65b1faa49a863bc137b79172f8a730850acd894d
SHA512300a33b9a7d1e1fe376ea8271ae59ab017a587ef4fadec8fbb3875db8da39a985b0f1676e92b7f9c7ad90f4ba1c71ce2ea917fa944657a6e943fcd6804680138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566118c8aa729b6dbd9c4d85e51950a33
SHA1dc8106b2db6d74604b458216658cb707da156bda
SHA25698e751d32829009a7fcfc8baed4dea0599946f7e0b29212b3a59c07d07e11b5c
SHA51261e3e0dc3539a234826a08caa1105b25df30b7bdafcee3c8e6c79288a38fa6a3033eac7c457968777fa591aeb9503e9f9fc3fa3e03c2ed44196fc6cb9e3def5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfaf583ae1d74104b2d39bb629f55abd
SHA11b16c8c3b038155a142a8cfb7cc40f3be1446ddf
SHA2561cdda31dba866d00043ef34fa42e45645264152be1aa6e432dfbc47e00de1c68
SHA512d2854bec676bc30ba3d62ee34ee11a8e2e66885b6b8059f7017d2bf75dfc03fa4e989478f7a5e7dedf52727779f08f518a22c4cc9b360fd86f12bbccc5766889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52434ada77b3534afa4a1e728ecc3c76b
SHA125acd6999ac9582a02b4e364d764797d4348bed1
SHA25677e5f5ae389577895be8020a65ab41ca473a4c3ce4ce9123b3814856cf4b7b18
SHA51290c57a24b20be947a533948b4d006505fa1145e0bb170b9b64955ddfcaf27b3fb138552c252bcfcb80ab02aeef2f2f0a2187bbe2798529e758eb06b8db202c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d4f63a47b14e343e1281d8824a56224
SHA197f9dce00f8017c162ea48badcf43ed99de73351
SHA2563ae149ede72a69dc8e691a831ba73b576288be42265bda606589696820a4e67f
SHA512d96ddd58d4fd248a7ec0484d64180ed16a09f4cad815c9a53c5a0dbaefa6f1d9a402d5dc8c2ec0fa80d63e1f2d4de6165bc916bdd4c7c2b694680a9c1476c857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511312b529f05a5b409924ce1fbcced6c
SHA18852b384635ab8770df0823e53e1d47cc308b22e
SHA2564d09c8b625bdd648ff2cb59bb3a28f27a14195db95174663ec24c42551927866
SHA51226a692b4b4462e2ec0f9503445e1a7700346f4ea7f27d8e203bf5d9e5d1ae5034ac9eff98372b17352bcdfe9b5b1364f71aef40e6a5da19028fc1e88dd30d95e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555161b8c8b11980bcd2970bb2954ee46
SHA18f240d12805720d3afd274598aeceef9f2cf5a4c
SHA256c195bf9e4fcfe4889de1fe33002ec3ec2d3a01d27fd8de4fb7b46840060c8ba3
SHA512aa9827db9508650f0c223588de875ce3296d56fe851bdcd5c6c2a3496cdaa19c06f4c0e70895c7de30a213571b03259e4f405d6afc6f7c3e65dff759fd3b7f26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d329250735bbef2ee7aef83c6e926610
SHA19f41ba313935bc11853156ab733d8855666e985a
SHA2567519b2419f92ca822fddce8bd07f068c31b90ed98e9be71557426f6b64b2936f
SHA5124f1e9cdf77442793ab789fac6cd8885d00c1c485b5e7919d015553b724130993ae18a866521762f765e0f97cd7d2d73c960518e5597724ccad8676aa5f9e8b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513527605cb71f83615a1678e79170583
SHA1c7f540d0d57cf443bfa95e39dc0c3269b472fae2
SHA2568df97800db58e5c3f3539892c9eed20cc16225221e954aad04cfc4587b307c33
SHA5123567a5493a86a27d26142deb59462299ab78c921d30cb14c75bd889e227abe1ef068279c7d073aa7beb38fa134f4912e3f65776a0ac1cedd41d080d782b03dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51abe996739b21babdbd47754ac7548a0
SHA1e57d2d31e813ff79ad9e8f681a97d6330ac300c5
SHA2567c63ae6966bd9589b0e1f72848df07b76e01c2b05a446337db48bc9d57c14243
SHA512a5f1794208d67079c6d55323c37bd03c6154931e57db3f17be0ca890ba45a56ad2fb108e220a00a05523b99157436fd0c13577661ebe377b3cff427736a310bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5619c77ba6fe4a577b4197807de040c1b
SHA1c60491a2b318b60654c6b567f5b675bc570bad85
SHA256befaade70f5df5f1d0b8b9ca897d1f80e9c1852742539361cfb25eff93673a36
SHA5124f373ca459a895e4b47abe41a4917bab494443b836557c021e4e4ae8ab6300802a599bcb66530623a4f01028ab814819a69a94ad138c8df085938ac32491b209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd8d32e07d3114b16781346ae137be8
SHA18de44189f1b878c4c4743d2125f7bc7d53153cd1
SHA2563b070a175ffe0ef85ce3697348b8ef04f776b32dcc5de4b1bc60188b0bc0fe45
SHA5127ea551788487b5278a862cd9b16b0d3360cab123346564dd24552987276d2a26ebfb55348de33ad16c98ffbe67e4aa3f8ba24dfa1a7fb294a742fbf87fbedf7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571c1a2d79e97e94612e37986a476fcce
SHA1cd154c06ed2727a994460c9dfdc6028f479a7aa8
SHA256d46e2b0c88e6a93635205aa4ba4b46f56de4163946535b8a6ad73edf130746a0
SHA51211100ec2e1dff3555db4ee53188383c55f153d883608c47a8445aa38566011b1e76d184b576374f069ad6bdfd410a959411e4e199b6f99a4866ad4b5eb7124bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bb4e31e197fe96206692b43a4e2c41d
SHA11740a5d34579beba8b28dea8005e20326ac47a01
SHA256ef0cb1641a23bc3e563e4aa34bc383364f59f2c9b37ea07e9d2135120c100620
SHA512e3f2870d9932494759969740b59ca687b3ddcce78ee345003570cdfc03c06de5dd42554c8d3d1921890d44bb077588c628b5e1bb77d517fabdac072350429337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6026e0c4807bbc06ccbf28eba17f573
SHA18a5a631540b117a545b627abaef2be1585754d1e
SHA256202be6ed5f7224f6d5f9d3842370deee80529ac702c9f30adcb4b822ff79fc08
SHA51281e27115d3a9eab0dffe495cde7fbebd6c7eae255e335e375fc231a6abd664c5e67ffb0b645704e1f7ef68442af07267918e003f2708d05c64f643fdb779b144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5340ed841cd3cd788ce1752e6e6280779
SHA1c54f08a0a5abff023b0ed85ffff284a8562e4641
SHA25699f0761c1095799de0ddb00cd9805d560b0be2660c33e33a5838bed49edc0425
SHA51276f37170ed69ffa424a0d3f23ef63503878d6f40337ec9634d40b81e9cfce2918f85fbb29c381a82fe5c0ab351e152408d7c4c6c5c062b513ebc3b11414daa40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cf4f8ea0fdedee5431275b71e276d60
SHA1be814449624cf1fb380f385d6608e27c1ddd6fb0
SHA2567413ba36fa555963c1810b2c25269fb136f03e506fe0b1ba80e181895c885f96
SHA5121acad6d1a04d590491ca00794620bce8f9420c4a88ed28ddc7d9adf1b24929f607ea4c32b9743bc2a19adccecaaeba2d6c900c68e5dea0542111cea7cba6f1f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cbc79cce0bc98c65482a8ca9965d912
SHA133f4d01fdc8c3a214efb7bc37ca57445e9602223
SHA256230005d22cd9f9b04026733ac7f231cc5876efb1a68d3170c4d85984b70d80ae
SHA512118bf99aa984a778750de8ea9e93ac76326a37ef90a335e9f21ce7220035741e268b02429c3116307720c845db7d461dcd40dba236edb9f3c3612d1dd8a87230
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b