Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
dda0dba5e49812aafd7996f4981270d9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dda0dba5e49812aafd7996f4981270d9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dda0dba5e49812aafd7996f4981270d9_JaffaCakes118.html
-
Size
23KB
-
MD5
dda0dba5e49812aafd7996f4981270d9
-
SHA1
7bb44973d9f82485ffc0e5c045e604c0f8888fa0
-
SHA256
210e37d07e635229380940969776b31a8e9fe21ccd82157ee59bb056dd6ecf59
-
SHA512
e2ccabdf39769c0e4556c07252d66bfe43c35813f7fa988c233ede410bb7e91a648da257ee4292a974804a7a1d2510fa485282fd72dd0768df3f088e9919b950
-
SSDEEP
192:uWn0b5nDmnQjxn5Q/anQiepNnQnQOkEntWcnQTbn5nQ/CnQttwMBJqnYnQ7tnEYY:SQ/oLVR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000000462eda2988d18e3b53a72e932084ea6f2f955915cae9d2b0c262e4f579ca2b000000000e800000000200002000000037147df8179c40a40b48bc471a7fd08a416466bff4568d4adaea2371dd5217b52000000089365daa952bb058a08c555bbe5db79b2ec0202edc7c7f139b793e80d546201c40000000bff7405b1c7939a1d5036f45789ca9fc25954488f9315e024ae0146eb314bf3dc68a88aef9311e1160e1d5b79f720f1bdb017558bb9033bd24621fafb044cc35 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4C3E911-7184-11EF-B4D5-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4033009b9105db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432361920" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 1480 IEXPLORE.EXE 1480 IEXPLORE.EXE 1480 IEXPLORE.EXE 1480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1480 2336 iexplore.exe 31 PID 2336 wrote to memory of 1480 2336 iexplore.exe 31 PID 2336 wrote to memory of 1480 2336 iexplore.exe 31 PID 2336 wrote to memory of 1480 2336 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dda0dba5e49812aafd7996f4981270d9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50528ed71327ee17c9969d223536303ee
SHA187bcfbb3901f394a3df302983e59d1f268bcbbb7
SHA25637faad2d5ed8ad66f4fa36e387c3f980f83b73671a73fa13e152c0e5bb13e5c9
SHA5128f9e708482c66808ad5a54756a0ffeab1a3cfb9d7e15d4cb9b68bc69383a6addd1afa18ec8fb4a85b43ee08b76e3de7111a3c4975bcd80f9a0d109c39d56d8e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508b7d83d8ee8b70e82ea5d69c828e824
SHA1b8cd46b68d6a1471506c5f41981ba05ae09809b1
SHA256340b6ebced72f7395fd4b5eabd35dae69e08cce32827274f847df93e4106d98e
SHA512d0cf7b1ea519bf63d16cf544d6850a6a66abd6507fa5f0e527f768bff5310a10ce7bd57dc9d8b14acf336b2fba514471c82f93f0acfbbe12e437f922cde23870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5343687ee323d58df61bb3d96de563cd2
SHA1d8379dd36358edd9deb20a544341c13313870e82
SHA2561bde7ae464e4025a5c03888c4ca6ca96fe966b0955ccb0a0821f5bff6c449e52
SHA512b3f64de7d7d6283a0c133dc6c09d7763d1dd0308080d6a340014da32498cdecc3be4ed6be6575cc9cc097f1d73a2e3de6cce016abe181116a771fe4144909a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5495bbf356b2cc667c52bd88a91192dae
SHA13b053831a45e70f675b277be2cb334adb4f4b2f6
SHA2568de86f0370974a1b45fc5121f528507ca8d46a6cb7f906b73d9e853711e1b02e
SHA512a96b37e42f01da7f713d9f42d591722d40f16becc1f34344fa8e91015df540d88fb96ff726af34e7bd5e263ee00e19ba962583011f25d940123da677c7d88848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534ee546d4deb3e5b381628f89c7bfcd3
SHA1550d4f666125d038927e6cb3e5033fb70b0ac049
SHA256f1038f308ea2aaec9e71622ff15b9329b6d575aa6b8934c1c8b1c04fbe82b446
SHA51279476f74f2738ab6f3cbf06bd4f69c73692d6173ba449cab0b1045e608b69f0e9237ba18dec69c1987a3d14015953c9d3ca6053ee6e0b62a535ddffa7b6c5c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f46df0de660376b819e6e127594a31de
SHA114909bc01317a41c482b2bb0046ce6f9fc2c51d8
SHA256a032410002bde5263e0eda351eda2cea4e93ac35592645b185a6fef4a7401d5c
SHA5124c5ff1b10290e743c42656f3248a039cb017508be024382f1c97c980c84593f9cd3edea2270f1e9150c5e79117839e65d234d5cbd871ea4ab3add3b913572322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7ece4bd57f8dc4bfa8a761551d58222
SHA1b082dfe313df4f4be08e3173b4a111a94b47deb5
SHA256a23aa610a6150ee86254d985bdbc73ca300e4fce6ba0711dbe1096979537ecaa
SHA5128912d6f3651e11be58cb11670858d1dcc434c0043ce5e54af2ece9bf1d0dda017b20883f388fcc1978c057343c49e15f2621cef5b751656e17396347340a0618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c488ae8e0e75861e968f5b4474cdac06
SHA1dbf66981a5b90728054e8027ca383f3896cdf1cf
SHA256d8ff5874cba61b332615f83f1531504e04758585e33eaa516a783ab09467f5a9
SHA512c243e9afbdff2b1e90a8f19fee6fd08f113b21cc308cfbff3539587f12e38512edaa259c04962feda2ca6e1134882f4b7d633924b11a4c355bba49fdadbf1741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564da32760883faba13a08a16d36a6525
SHA1afd365f387771ad0b5a838f3857830e039633f47
SHA25606702589dc8c17d4d371b5c7e15dd12c2d550714d8b23a05d330268bf1e4f0a4
SHA512b80c90b366b7bd3c91645e5bd245e96520e5cffa0c0bcff6f76cda9e28a83aa33331ae67f41c66beb0eddf0165c533d0df678a2e5b5d6f76373a300626b2b79b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7d82873744692c7d39e375dee555957
SHA107efb265302f306c95cee59915ec3458d0ca0fd4
SHA256ea51b0861cf70077905298c309b69b994542a763417ebc293cfb25adcdbd729e
SHA512363be3b1506ada7ca49eb921258b968935ee5897e472098ee50e049c3317e7144e5d39401dfd213e518fec955cf30038dcdbad16877a49b30176d9f08d463f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bd1f5aea4e2af9a1bce2d25e30faf55
SHA1c425a1ebda71f4db32ae92bb9dcd68903a77a53b
SHA25640a6a50457ea6a74e2ec2bca2db74d83754c35affb92acf1f4ecb209685333c1
SHA512889a52b6621ff299133b875090325e55d9243755845ac99d12c3d9b648de4b291e1e708826158e456f35414e5376c4866b9cc910a310ad0f0f3b9d435550169d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bccb84ee00d7b57371596b0c3600b511
SHA15987c550a444bfdf531f4efc1efb2760976252fa
SHA256070c70bb047feed5f0d45f6ca96ee4b9c18f029b42be92a146a67c8e9551e3b9
SHA512f00a42657337d0d9de690de836d509170afe2f6c0e390b56e7e1bb92c2c38373455913a32f5b17409e72a9f974fc04990955c7e89ce0a5f0f0e57a65b365a549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc1eb4961df23aad26779dc20566c0f8
SHA11043b6b56af52924028c2c599fb32aba2329abb6
SHA256fc255afe2fdd114ffa7295e6d045d541d8cecc22c1c0c6a12c89aa6063881c9b
SHA5121db8bc09036d2d36391fa7cb440866864344df9f9e081f34433b0581be50c56cca8e19df47de8a5afc48158a4709ca178a4ebe20dd913a7cf3f568f4d950cefa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df8d2d1890ef0b7f7d7a70b1dd6ccc27
SHA1ec4c73ee74d3c9086420dfdd1c324eec934c16b4
SHA256016ddeb757ff3b51429d6b03cea3c3518119a16b29fe784de6a195c50b90a759
SHA51287fb79ecc90670bed13f347cb2db97a7f39ab67e0cfacfffb117896e11038bb512d7eef7b8d8d3013c6d43218a32dcda5a20e9cf2552eaffc91e5ee4c3c612a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c6cf6dd4fc87003b235dd8e53323ff1
SHA1bbaad1f4ce88755d36e4b80f49cb65fec54ced12
SHA2566dfd6d68ca2087fa0b332dad52b2eb3da0eb5ab71acdb54525956813ca7cad03
SHA512e301e0d1ff3f426ed6d2089f35258375098fc6116d06f68212bc2f9aa5ab1d3c937f8920f30a7a94287d6e21d47827abb45d72d4b260d44994e2f4d2911c40e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c62e827ffa2a240814cac85f3470775
SHA1e94dc1d0ffa2017adbecc3fb6e4ba5297c0be24b
SHA2566ec53cc674188efaf83733d608da76c8a80bb7c2c226f7dee8429fb4eda35f7a
SHA512641b8baf822f283e08a4a3999eee034bddfa375e0fbff627145474d3c7f7d2a8fbbe922288b77357a7195307dd67bbe340326f509b346b5fd2e3fa9627502e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b66cb3b0a30e0a6a4049ce9708f9a70f
SHA1949385b73056d7a743ce485937123e39354a354b
SHA256195831b044a0f246ae14b1cee2d3f621febd194a007a0b7a8e1c4e0cc381b42e
SHA512b637039583a0a0a3139b2f29a819ec721b848a5ff292d5aa7c6794fdfb944f30c4b59ba75bf788e79dcb80443fae44275809daf6f94747d56b1ee43ef589f06d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f4705d0a9898b8d4d6bf4a8fa0fb4d
SHA1a13f45be7e89c3f382dc735eb35d071e78b9c2c7
SHA2569c82805b40e6107490b34074bf8a3f20258ee46d7ced371d2d0f797d503fd7fc
SHA512bf8df68e2672df2e0d36e7d7ca38d7ef65a149506bdeb646c6ae3ab67c6557e26cc5bd5da91382cb60bd96666a87e9702d878e1e040084179037e05d85286817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513ff75e551e79c2fd009d301c47b55d5
SHA11bccf41521284f54223a3a646168209379e28c1f
SHA256b1719617fa24741b88addf9d3c825bced0988cf2af53825c85120aba92d6c81b
SHA512e17daf142d94e1a15965e5d63cf36078f5c54f522ed766702a2be83e7d4aa73a3800ff400a5629eb216f658488498e82f4cf4bc927e58b64ecc3926c0051d625
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b