Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 17:17
Static task
static1
Behavioral task
behavioral1
Sample
d00dbe8b8340edc44e4d142ed8653270_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d00dbe8b8340edc44e4d142ed8653270_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d00dbe8b8340edc44e4d142ed8653270_JaffaCakes118.html
-
Size
157KB
-
MD5
d00dbe8b8340edc44e4d142ed8653270
-
SHA1
f53a38d3fee19299e70c4f40f90b881471f4c548
-
SHA256
18b972d6961651cd238683cd4c055acadaeb5830635045ccfcf9c836a168b193
-
SHA512
c2b211b8c77d829de62133e60b4343ac00ac932901fc8e9a96c5e81536a223c63e8d5fe2d31d147a21d9cc309b22a7c2da0392553ef2d70d0a77772f1a8a3b33
-
SSDEEP
1536:SAlMv4b57CHalq3RdeBTyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:SIfJyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000058cc7f2babf109f9474f1b2ecc0072f22667fe26e2fffb8f20db6ce18df2ca2b000000000e8000000002000020000000c5ee7134a6fa71f8e66777622940e28db394030d0a928dc54707a770a889bf0920000000f2f43da0103fdda2d34224a23b3c7171dac1cca498e23c20a37fad1e0d9c7b554000000089ecb8959e3721423760419d7cafd3be31969c52c868295c1c37320fac508ba37c21891312305b0738d309224a35bdf518a0d2291cfa225d10a65321a6358009 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e5bcb98000db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E524BE21-6C73-11EF-A641-5E10E05FA61A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431804917" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1464 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1464 iexplore.exe 1464 iexplore.exe 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1672 1464 iexplore.exe 30 PID 1464 wrote to memory of 1672 1464 iexplore.exe 30 PID 1464 wrote to memory of 1672 1464 iexplore.exe 30 PID 1464 wrote to memory of 1672 1464 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d00dbe8b8340edc44e4d142ed8653270_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1464 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eda559900d9ca4e595fdaf946fc471d
SHA17f8dad0ffccf8bdedda1c1112a0cfc6777471047
SHA2564d28fb50d93d5767d09a000286b99103c222de11f6e074f74491945d883578cd
SHA5126350c11ed3411cef2049f561ad22d65ae9968e0fa6e1c5cc30ce29b763f28ffd13755432bcf2b7e46dc948ccb5789aa0c2294bc423376d8efe89db3ba88e1015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5091b42de14ff2ffbb60f319635c38019
SHA13cb0660227ca5013e2f9e80fad4da66cc71f27ff
SHA2567d6361c7419114cfa896f6108f778cf71cc8d9402b260bd0105e216ecb785dc5
SHA512aa172a049d2a49dcd3c12225b28a786f7a214b5437ef7264b9f35250158256aa226e0a6302984b5820e1f0507f6fe5ceb916e0a21683980f666d1725a97a9c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf605f2ae194961fb1800df242a5358c
SHA1cef27d373a6610c2da54a5b5cbe0d20c93d6732c
SHA2560b8256a53d864958e87ee3eba21bb99b365854a8f26c03ebf370956b6ff97d3e
SHA5124713112e6d70ff4ac3f029cb91a3eb126bb1523b409a59d435c38994f6d348a3bccbb90c91291e47353c43099a520313a6b57f35477d71fe2e58d0624ad3cd7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d529db269792c871bb46f4074e8a73df
SHA114ed2c8956a1592c5b94c06d55efc4eba920f86b
SHA256b53e56ac655f6b42041b4ba793d96e05c749c4ab500d6da8e45320d633612d71
SHA512c369214d6863087bd3a756993512ca932df4be086f00f56aef5c5cf42c6140c8540617a48bfe5de7d6099a20eeab351ebffbb710f28cc8628054d9cc0282177e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7174bf12a6fa3774ebb686b2b672f10
SHA1bc247ead53f1f7a4346527025a051f7bd2e10a7a
SHA256bee81b8c50766cfa62cf357c2c9eac75a521fda03f7ad4043c87c51b393321ad
SHA512671c2a12c32261433447e9ab6764f32b044c66d9d6d761b711d30ccdb1b7eaa39fa5200a5e595f4498ad8b3a15ddc5a82e7b44586e6f045e4387fe79d875731f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9a22fdcf1d3e26a9128b6f5d4bc7836
SHA19fdde9d8e95c707dfc6e1e58639a2e1c45f73180
SHA2565b21dc58a4f6049c80c1a02d4327c7416cee6544ec923d83ecc6d73c74b62727
SHA5123f378f64c49d855bde1202812a9880e687b4c279bb04270d0176930d19f8897affab90b7ca8edabad32592f558543856556a5d77bbfc74703d137de0cf22f57e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c54b6f8c4d9961ab54d90b83c863b779
SHA1e99a3c94f59e3c66845427f700f215ff9f97f8d8
SHA2565b566f372bb15b279107d872b35a866e866965cede12e4ba16c6481244b4a880
SHA5121cef1935f5689438f7c4584b6859151fdb44a5f55d005af37f45d4b325d6f501f755ec1f21d20b1e45bf55e16ce2ec0bcab0095b01f99fc6d7c0fbb9ca4884bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9607860ef556083c5d7e44cc7a5f80c
SHA110e01e4394647acaf978e949b30a1986060c2a02
SHA256b6f9c874dd043ac916a7d25707c30c475a6358b653c278a879b201c368b70616
SHA5124bdac6a5522970d777726a57e36bf7f1253ccd1acbf0ca3b6a4c7c0b9842b98124fa8f47b71a422ce6e18480e695d3279abd2533fdbed9df87e766258d532f91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4de04f20fac8d51ed69b167c2e72df5
SHA19bab131b3a154898babebea87ae4d7bb28088bd0
SHA25674d4d3bef78dff3e3ca204344d96d32cd9a886c1e89d4266cfb7840d1dc8f576
SHA51201ab3c71d52e18f8b14a40ca2251ec65486921699be445ff2ddb9cb71bb2f29fe3f0e42090239152138f85f8832f05df445714b35176d0b85b393dc8b8f8477a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bc6091bf3ece81b06021cdd0ca4aaff
SHA17af93c130c0e3a5a2123169c729e418f81590727
SHA25647682c38f8c7a9b609cc4c2ac2df7546c278b7a40dbe94b25b37db41fd545b6a
SHA5123a0ff5c054afc61038e6739cd69de487759f09b0b8be0a0a8bd93f254d4d1596dc25fc851278ce0d6e59d982029753f6aedbb6ee8e76e7aea257810b60128552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505a7cef9f0f1d59c710e9e18f54f6b16
SHA14ef8fe099267cd8aae6803581151721b76038975
SHA256afcd6623cd55a15156e558941c357ff986a25a99bfee336cc18205dffc4df7b8
SHA5124dd12d138de781ca4bbddb94d7e8b89c24b603a054239d475178a86989cb4c006c6a3e92d0717ec198469558f6f98c074a207f9aaabf96eb32b38a3383058c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4526553d5d5b087555ab6e54f0ea2ca
SHA171aaf65e212ffbaeaac93c83922dc2e9f20f1677
SHA25602ab94a4c20e621bd23ed82f16515dd7b44483134d086cbb3fa3af177be70225
SHA512f0f118bccf6b2039fb3648edcd73f639f13dc513cd614273b198ed8538ca2c4b8db4a96c1ccfc9de5359e4ffcf5637519c813a177f73b086705f24d8590aff06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551da512f447d2e4bc5b1b28a630380b6
SHA1d33c82b2b286fedb63527cb19b1daebd8e83b139
SHA25640c5915670460dd7a1380492202de3cac145ec7183ed3a9f3764dda4ce62e8c4
SHA512d3403d9382f42f2b17002e50cf11b119e3d14ef8a3154e1af11db874aaae0bf76a828596b31c880f853a5ab6355af2fbe9f6faedfc846e7891ade9de81f1329d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1d219eb682c4576757fbd53f73b243
SHA16a20a1fa87dd0df81f270add6b9b9962960c671f
SHA25694c4bccc71c904d3bdaebafb6c7f73e715f40916fc7ebc046617f4469ac7a475
SHA51237b694656e694e8d177fa28986ce99c7acbc54227e6a4ff0b6da0c595d5576d2eba4b7502202583d8296ad66c2fd5f673869120a33f7161ef5e3703e5854179c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5589cb264e3ead8a8f93e1934f8a7f346
SHA132856c8f8bd2fede816385beb6692ea87ed383ee
SHA256a5e0a319744b91b3d859c84593ce0a2d6efd1b706659b60affd230701901afd8
SHA5124f71e93e0e943f8a6f899a4950ebdc97d6e66bd31dcded5778875fa323a2b735fbbed7fd1fe2a2010fe2d78883847629a7181939890b94fbc4d505d81d4d9597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52892ad3581a98ed072da911f898c0ae8
SHA125880e54b50f722e85e010404e2506a89f37dfef
SHA256026f9e96bd2cb3e4eff9d7a0688918116e95cadf58d201405284c1afdb8f2821
SHA512c7160750b15bf3ef479e2687aabc86c6dcc4c8b82a0712f60454a34c5a95dc801ab4ceb049c7b5b814201c93c00ac0f7a72bbe88a31873f3b0ce678e77096513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5748a123a0f1afb88e686fc28cd4c6353
SHA15d0378274b6de557ea3f56e46a3b9ebf596eb8c4
SHA256b47d8ce35e8ba67e7ff93719b24a7b860b15d28d8bafabba09e45b57c237831a
SHA51286063d2a0e6e1a7a468e09b202dc8c495b468ce710d6e9d64b24655c11bfb7f44dd97b3d13a647dc433518dc89972a8e2070ae142aad714810feed0514605159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1ece3c3e62204f0cacb41193c49e3ac
SHA1fbb6c221d72867a3c5919f6042d20be8f6d4deb3
SHA256ecadadf83ea1e266a182200e2fe46340e894e5425e88758af970e0907e714762
SHA512cbc64d970b799148f1ff9f18a70149177555fe20fadabfe5e15a27055e0cda37c530a1620d0d224fbf5b6f0b671ca7ee5671b1c0a65edc523285fcb13ea06644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583b74b08ce0cd30572db86eabef99a44
SHA18463e4e2449d780a682fc68518a2f92af4dd301c
SHA2563aad5ff3535a9577db7e0a4ca89bfaea1fb7376c869cdecd8bdfc880829e03ec
SHA51291c98102d44463642841d4cdb502f8e5d83ed318460d5f425ea0ed40cd4f53292264805026c4028040c82748cd75ed0951efc294363e4459bb5c3042742070b0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b