Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 19:35
Static task
static1
Behavioral task
behavioral1
Sample
d04fcd4c581734be5aa9f8af2a6505ce_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d04fcd4c581734be5aa9f8af2a6505ce_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d04fcd4c581734be5aa9f8af2a6505ce_JaffaCakes118.html
-
Size
34KB
-
MD5
d04fcd4c581734be5aa9f8af2a6505ce
-
SHA1
c36f68dcf896d295fcb1f5ebcbe56b38fd144483
-
SHA256
70a4db298ced215577d1e1570cd514bb0632520e13604f0f01ecb3aec613f682
-
SHA512
cda751bbab0952dd5fca5938e7ebac762e096f0fb322e48c70abcd29447b54ba4e6b9487ffe8182352479f9eb72b00801915d70b19ff8f70fdfc069f77e5c8a5
-
SSDEEP
768:P+8T34yX9sHWMqal4hh+L3ElMeenZmOo93WBA3muN35v1vjv3YUK3n0K3qwj3B+S:P+8T34yX9sHWMqal4hh+L3ElMeenZmO3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000001f071b5b7610d45c5e9cf17dc1b51f85f6856ba61adf77a8d52d8d87c5e25026000000000e80000000020000200000007805f7e6d4e5b00736d3af26e2f5f2f766b0610f613e655dc5c1376dd7ebe302200000005921da37c539c44a7eb01496ec4522a2cd88694bf088524459d3ac9e03a6c91a40000000791b8b7393ab8878074b76b3c224994cb5e28a8ddf9c5bacf1a2131e87b042ff8c7eb28e82cef3ebb06c097df9d6d73b7d94eacbe093fd2f8019821e26dfe629 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431813184" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{240E2BE1-6C87-11EF-A0E3-4E0B11BE40FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f004c4f89300db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2720 iexplore.exe 2720 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2672 2720 iexplore.exe 30 PID 2720 wrote to memory of 2672 2720 iexplore.exe 30 PID 2720 wrote to memory of 2672 2720 iexplore.exe 30 PID 2720 wrote to memory of 2672 2720 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d04fcd4c581734be5aa9f8af2a6505ce_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bef77703f893bec3a4318caae244b66
SHA181f7c6be038205c932973130f62587709d987dfe
SHA2561e5d29dec26647ad6f81ec67a0a20958aea2afcd3a61324181bf4f7b6cf53ced
SHA512dfdfa10d62a925d1e6523322c6b541fa30c7802be4a7df6e1f4f08d1b2dbbc87cfc711b75cde84778dd22291616a2fb3b664e20f11ec886c6050020fbfa25424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e59d58fb25d5269d48444529e27c9a7e
SHA1c04a7ebedaacc123e2c2b469b2891f8080dd9615
SHA256189f3196f0787d81c8f13b01f488fad64d673c0e27911dd286bbbc2c4c7548d9
SHA512ad26256e1ee1d82b394dae9b8e42987064252ef3c76782c12b1a19403e0a7c2d2acbc1f387ec441d06bcc529cd86315343f6342ab965d026af9955e55fa7b6ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e56119a159ae856dfc4c549ac0573f7
SHA17f9661a36bf0ede73c3fcc5339b04bf90a1e1c9f
SHA2563493d177bd625362daa3a4da8dff89e10bcce762fd01a5885c932300a6ee1f48
SHA5122c97d188f8b452224e1d88952e109366be00ed482b31dc65b899ce3418c0ac5a980e04bbdac5225694fe5edc774a569c8e32b441aa3017621e543ca8d2c5a04a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594ea030954ba0da51e42affdf93f0e8c
SHA12134b03ec7623c89b36ed2b11941275c042cada8
SHA256dc11b1d4436e7dbd221ddd9d98b1606fe816029996f96755eeab5930f692631d
SHA5127b45de8c395d07e808994ff833a10ae8797f20aaf3c096013be835ab0b1c5a84ec4ca1d953b3e9199833f60fbb057d17322df9614faa0b271aa11e91b8493127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e60c9aa78a67829bf64a690bf698def0
SHA1848269b143066c02bc9ddb4d89ace9747e5339f7
SHA256568648558f912a66f5e39e2dcc428b0e670e22ec07297412327eeb7642d1e5ac
SHA5121dfffb4b481fa407a6b1051451a347376eea7e0b7c9bc2ab66492ec030032a5ed735fb67cde8d14ecde3c544f43d335cfdf8cef497e21d36c3aa18b1a36894f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5760f4ed0752a01c254e71c6bc0f5721f
SHA1c276b1cd27200778f47bbdaa90d6c000b21ddb67
SHA256c45e95f56623ebcecf6b45504e44355fa496510b1ac3f029b008d301929cdd31
SHA512a9be6e0713d310814b36983be12d96af3576fa6ef9087c9d84029680114aaaf0329dd86ff96ebbce7d107bae7167bb67d7e6b55f715093d7d665a81d4cbd9e5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ee7abb585bc16d542d01f02efdbe855
SHA107cf4a1a851cf6a01048d1a6553d41e830b759b1
SHA256a15c08d59894b56be357e5ec3f7e82c5c714e1cac99206636ef936bf2ae93fa4
SHA512fdb195ea74d77dcb6363affcd4b33d62dfbd520392c6409118fe84b2fe77073d024f15eb2cfc5a1da78a5459a44b4dcd0f27ec51e55e69912d1b894da178fff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f28b6de53fc008b3de307f07b743a9e1
SHA143e61909a1bd735269e6f411c1cf4de996d10d54
SHA2563c0771d6b23e8b3c79eb9251f511d177f864ef4885c128285f757fbec3f88e23
SHA51243bf0dca725264b0aff675a4e43871087ead244571b1c5b60de11055ec5eea8732883d90ad6cb13e7b004c9529889cb9e8fcbf72b0a8bdb6e8c09e0c5dfcf062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d263a088724b2a295818387066f55c74
SHA1f5ea294af369e506a0d7abd2bd7870568e57d83b
SHA256ef98570e3b34c8fff7e5ccbccb420efd6529c194015514eab05fc70d96858996
SHA5121a4561749833def669f764ccae798eec902c5855f82e806d21752de41fdb043c38de43f26fd78302e5f66ec398a601a066165bffc70fa7cf9927f41956fa48b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4ab58c8ea09768d3ff02b1b222a1f57
SHA18f4366aebe390cb6464f4aee67ff581c9f8c1158
SHA2569bb3cce2fbd80f688f9b5468550395a756f34eb7c7535af810879ede805e72d7
SHA512b426cc122198b343e3bc3a7d66915574d20d285978930f4b67ba4ade21d519cc10ab97ccd2f620cc1962b3511d3ebcd1eef421ba6bc8fae1bf23432d44b6b551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52927812af592bc31abc7bd4f26547cda
SHA1d99083d58a39d0b69dbe5e16131cf414f9f60046
SHA256150614e3ac50af1276625d90499d720563b6c2a92f98a944a6d68f680a9b2a6c
SHA512213aba1def14acdcb7dcc0cf677ba11cf86fb111cfbffd79323e7927d57a197085f64016113e2dde14ee08904879c16c5e31304906cc8633de384b7e370aeacf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569da345eda4432db935185b3d82206c0
SHA1d295e684f031bcdcb3bd899794e92b4b37898327
SHA25645e9f92b0740fca932e254a777fa2185507e84889b13831afc5dc38ca98d0f1d
SHA512f8c2529898127e96522ce30dee778750eb59fded0c8bcc08d3b83765c8cfffc18a5bd659622aa0dcabb67efbde1040b9974086e8a75824791e2694da5fda42c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0aa33c0c05a03cde7e8e6411f8022ee
SHA180770e3bae9b4c2814d45aeacac5f0dc9dfc936e
SHA256b0a74d19da38beb191be20dce675a5cc0e07a551b0afc62ab98e3cb09e1c7128
SHA512eed5f0645006b25a175c7080c45d9e8827dda3db61225e51580b2bad7b7722ac3954dad979c447ed8184f51bd240322754c052838f4bfd4e9496fbc51692d73e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e6dd0db64e3abaab41c0aa068302891
SHA170c3f3a9f850fa54f817a741332da7a00bf08cd3
SHA256cb5f10a41a4582c8d95342cbdf2680ff40d283f23c43405914c2515a1be9f334
SHA5121caf2cebc1104e66f0b70fe9819b61acd1d87f43e8dafc08dcd265f45048dd9ed2a14c91f511fcdc0787bf6fa96f589ed493c602b5f87fccc2c6642075f587d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559dfdc1bd3c2a079829911217d50916c
SHA168a65951248e945f841b524c4f62b8d92cec8321
SHA256e5b2582553842a7f72300302263bd009246b8d7a4dfdd9c8842f535f3d35a9d8
SHA51271d8dcfb00dd7329a2c40c1861df10285e48f1032e2309ddf3a79a0e2ed20dd21c20ec42f6b2abcdbfe3efa0d5d3eb0e1554ea28a5e2181dc02a4bb4280c866c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1e8e585978a9b6e2b5543aea22c9fb8
SHA13895e9575175f8ba53252a4b97c2a3a421d9332a
SHA2561e0dea9f5389f42d1088361f926d234aa5650dd262cb9d37e8bdcc96721cc2e5
SHA512863dd1a203cad7cb84d152f2829669c7114855c84e65785cab116850f947b43cbc1a2900065a7f43545919dda6cdc2e4a9b9b1426ba9fc57886e539b322a81f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d25174514ba3aef4e4e246a6ca6caf0f
SHA10eae2b2e2d153633859ee93d12d427ee0ddd30d5
SHA25606b366293c414c1daa217e889eca3c9c33270904921dd09d086ceaddf12557d2
SHA5126446f8163be05d5b498956e7024f7ba2e4bb1f54b3158ee4467b6334dc4da4b721ff58466fd8d5dfa7554fd70147e4c719360c0f651e954da648b14faa6a5cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501ae980fa3cbd1bda0730b4525330b70
SHA12407523ef5f970628d4820e09c375b1c41bfecf9
SHA256705ebde5444e569ed237f60a7893341c751f75b11045f0f26205c405021f7602
SHA5121dc8dcb6e8d8a3084cbe8d8ad973df3e30ac8aab101656c66afe4a496875432593714ac6ebc1fe4b3842733c5557ac42fa1aa8ff213a6e23c266746917b856c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a2f591257858991a116e88c1d75be86
SHA113af4569d4894aca46df4b0131c5ded2d5ca35a0
SHA25610e5df73210e253a1b6b732a307fbe84eb6134eea57238e15f8446e8a2567dc2
SHA512342dab2aae93766fb0d6ed256e6c495f8df2a1cc9becb328b2823dd2ece537723ca2fc50e16a7328767773012ca711885aa4e8930f0fa24ea42fed53aac2884a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b