Analysis
-
max time kernel
143s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 19:06
Static task
static1
Behavioral task
behavioral1
Sample
02da2e681c17e6873ef8ba752cd8118e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02da2e681c17e6873ef8ba752cd8118e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
02da2e681c17e6873ef8ba752cd8118e_JaffaCakes118.html
-
Size
138KB
-
MD5
02da2e681c17e6873ef8ba752cd8118e
-
SHA1
a15b8c918a60f31271faa000f6f847c843f80e22
-
SHA256
f91e3321a6bdad554cbfab553703e16bb70313b200082cc0ee212bc4926eac39
-
SHA512
95f2696f049e4039149a0dc0999eda914a60592cfc6e47ed55433202cf7c4556c9cdf039bb0026019de5e670e0e3e32b1b306d20348460a5cebdf2e27f2bfd90
-
SSDEEP
1536:S3NKreV/BlTColLRnyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:S3UmCyRnyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433885050" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14FC9931-7F5F-11EF-8673-F2BBDB1F0DCB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0cd9a2c6c13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000070b89eeac9abcab81051e2b80eaa90c318633faf38915a6481506e0cb236b515000000000e8000000002000020000000d30a34710928223c461e6bc84786fbb12300e80122e085a3ccc173dc1f60b480200000005ff77941361e1251480c2ec77cefbf3b83b53f9b1c5e237b317535028b60e6e740000000597954e28f76c1f452a668e9f2e272bd1ea922f6d452bcd343b16a258a040f6ba3fd98d574b6952a5787d108f0ca85cddd6017cc1f8ea72dcaa4f1d62662b225 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1856 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1856 iexplore.exe 1856 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2572 1856 iexplore.exe 30 PID 1856 wrote to memory of 2572 1856 iexplore.exe 30 PID 1856 wrote to memory of 2572 1856 iexplore.exe 30 PID 1856 wrote to memory of 2572 1856 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02da2e681c17e6873ef8ba752cd8118e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1856 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dec246d474be5f2cc9e5460da6079b5
SHA157f561923912fa219c298fad100e529ea59261b2
SHA25644ad1b66f80828908bc69865f95d89b25e246189a20a31969dc74525488e67a6
SHA51296a92a76089598542a3ba86269b6deef2f9920a2d58294316877243d73cb77560dce05c7abc58026da1f2592faaf0ce2abb4eaa4c87138ed1cc85f19aa75bb3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53688ee13ce42498b842e621e7b1d8c7a
SHA190907fa4dfbd8d2306cb9d7d4f0ced1e94d0a279
SHA256edf68096e2c1adfe7fe28cd10e14f469e7a91dd606edc2ca7fe740ae0602e83f
SHA5122016dc9679c7a6154e257508f6faa1da55ef95c921645a3b8b09f70ce4a8f0c6748858f40eaf27f30f9ad420d7c5e39617c21998eee6faa6926848ee5deb3711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5409d8d3fa1b194c7828fdc0f8c4a1572
SHA16acd85728d0877dfea140e485dab37ed96dc5951
SHA2562a06126ecce6552e0fb301e81a033d421e7ef8b0244155dd9a33c3419980c640
SHA51225aa10728651ea48f95c21a1a2d5ad1879003d984b14524b18e5fef08465cf9ea7c7e846b70b80f20bf405e5078a2024b6e6dc9df1d1f2f06dec45980fc36a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5048d7ba1d217f359ee68ca09c0d44218
SHA190ef5f7f4426d7095ca613558607f3a6b11c5437
SHA256555ac20528ca9b4b5bbcc4d74d9dad6daa3def43e9dd8608965e1d817fb0fa59
SHA512e0bb4bf23f3307411dd344ece73762baa9115dacc34f4f0105f1aba4252028da5d5360f8893e12f331547f1e8157c208508e8cbe36cbe02bc6bc6feaf267d042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe87d7616cf011eafdc3b26c12062415
SHA1930f37d2db56f3735f1a7c8305413229002fce1a
SHA25609a40c60059d6a9dd3e8fab3428f9ddefe7442b54a64af35b4ea735cb9a4aae0
SHA51254644b6a385959ab6414d2ea2db356d686c446b5da1f642166aec5d3d28997d3e571566d2ad29455cf97d9b177a28c2bffeb586863a128dd3178f24c9e1e95e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c079942447f974b0da06910d6eefab07
SHA174164b22888ed8657f61f8b3c2d6fd563033dcfa
SHA25612dbc0f984777476f16452fb56a0869325d51c2f33f7ce4d546094dd712d162e
SHA512949213eea4843f542d55383a1901f8f0666dd881f551fa7db870354380f47a347977267bae6c6f6e96b38b9f76160f64d25111a19c180538919875b24783875e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef547c4e51d9b9017071e30ae8c24b5e
SHA1d81538ad524f85ec298286d616de335b97a6ee5d
SHA25656a429bfe89be19cba82e33bd503f33889b9a71ec1af1dd14fed9f6bbe1e5eaa
SHA5126642735463454c4fb7b12e7dfb1aa52758fe392c451193fca0ab5a90c3d92b134ae62fc8b582d946628496ee0a01c50612c6b6143b2c59273730334091ac3c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c26745fdb841e624750348a678847328
SHA16d123eaa7edc07aeb620fafbd74d14819fa36d7d
SHA2566b111ffe1bb29c49dc078f44cab0c4679fcbbbaaed34f8207f39d02b7f95f20c
SHA5120334e1a46607c20917eec54def3672e37a19d2ff01cbc980775343157f1b826b62e8b6b9ed2e905bb9a3707931ba65577b58aa1b32a25eeb72e4e930a5abf6ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581085a161bd1528849dc1e3d2012d9a2
SHA141975dd8f13ba4856f5d0332e3823124d6d97c16
SHA25655ee46f5c8a545d1af539c626b5ed5e7ab2fecbae91fcf5f3b2b0d6f759e6dc3
SHA512340e829507f6d713e3add4cc73f18a7c30b2e900ad336ec83bfb7f980c2bc03864530a63e85acefe1b42c261e9c9f0d5033ff8dcf2ccd72229669f282b0d269f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f84c0059e4b09d281dd02e059c5a2e89
SHA145c71df987a39b0cf7e8a1bf84a3e911e22fa40a
SHA256bf7ad439c4e20005427bb597ed1f8e0d5131e6446b10f8409dd59984e2edde99
SHA512a2cf3e648dfbad33f3d7019d7b1198186bb84d5a8a6af713642d2c421a81b396e2e1fa6cdb987535890a1c72a15b87fda0182d76449120be95181e01dcf78800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d782de0189870815a543f5e96c4a83e5
SHA1d90c536fff2d8cb28d67531eca3916d502e7b06c
SHA2560aeb0f6b518ac1185ca4ba357408ada945bb034ec4705b56ee67c41a32d8a126
SHA5127d46f9cfdc912db886f13c81914be18f67d8265ceaf94d8a4162d3bb4ece6673707e764aea294d82c3feb6de7c7936c7dbcd453de1d18369480bf04f90d8d5a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a26ad3d32966b7dde34f911944e0accc
SHA159fafb778cca76bdb14dfb8a0e4b2f857397c323
SHA256044fd317a93af756b4f7288a13bc73ea324e47e6f7479044e047cf67a83c8727
SHA512fbef483e124a172a98d15f763869af3539dffa86f4ff9453ba7662ef5f6041e173ab3cb33ccda633c79a5f4199edd1693f3e5a410c547264e868bd581f1d2461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5033ab662bb7284605a7f887f7bebb901
SHA1a91d51f9308d2bf9ab77e5a390f7c7be1a831332
SHA256b796a631c6a9540b6b117f1bbd2ad3186d1300492d3082a2eec1921968117830
SHA51210065e30c513502f8a00c90e41d4ce318485729b130aa35b5d0c1ede2b496f537cf53ed10f5504f65e3ec2d84ea0fb4dfeda86b2d56b341b55966114e4f7665d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520bb61ac365a51dafe2b47e17f3275a4
SHA15e049f54ffc32731e1bfcbdc2336638d88b4f7dc
SHA25625e0d87964b380bc0eb0b874eeb8c164017932618c89ead4f96eccf8d480855e
SHA512439294615fe56651a1d24405e0d808694b2b058bc84204bc27229b628dd623861070a9e775f1ca9b658aa7e98acfd17f86d34b0b819a11c3fbcaaefd7fdf8fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dc46f135381fafd8cecdaedce718e1e
SHA14f59488021e24455d0dd23a8008536b17ee8b04b
SHA2561e9ff79e4ba1d7d3bc9dbc193505383ecbcc45d6b1bbd16dbd945aa98053e6fc
SHA512f2873bb89405c56ebccf5a778af0736b26370bf614bb58c5204a6bc92ed9652f775bc0a21a71bb735c45c74bc5e7a636a7a8e6919b50990b0419f1f5347ed851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f792c8660820b61e33429b23829e62d
SHA16ca1496d0e590888deb46608a40171049aa11e9b
SHA25653f32f0279182030ba6158bb4204ef4236874f2801ee4eca5e9ab4f10339df92
SHA51218ecebefc589b38e023843f54d320d932e4ea8c6f7e724bcd34466c683c5a174502e28dca6f6f6721399aa460c2c55509840d5b704da97f9ac3147729652fd27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581594b543dab5b35a1159493d27b05fa
SHA1770d48cc078be43b4153e473dc56e7fc070bf897
SHA25601220abd4365f8bf93fe4f88e610c1b7b28f55bf46f0bb1bc83680c96028421b
SHA512679d4c03365e5ee9ce62ee3772d881811f547dfa3b132abc5c2313574fa1958b9876271d64e5fd6da1e8b9ad0bbbbad32144694d6200eff9d5b63dc5cb6d8698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d5eb139a765eb1cfba89da4df4c1f4b
SHA18e227c993ea2b31cc5065d0d264def1e12943d1f
SHA2560d35605060078678b240caff4bae98a7deec9ae4cd55a9f46c48eeff2e8e0dcf
SHA5128d3a8445f8bf71c476b64ac6c7a5a8e1a91f52e07f71a416fe412694e8efece27d7a8b1f9a47cf33bc1c9f0d6fb91fb3ed19cf246281a650f2eba58dd7b7a2d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f01632faf64590903c3d434abfaf28
SHA14b80e539cf0bd6f35f65115e96810ef261e6dd5c
SHA25698c203a988ed206fdca7314cf4239836988478a627c8c0a2926e8d5db00f05e8
SHA5123940699a6396a80eabbf2bea339d2c61554c1878140e66813f39c50a51f512e2559cfa0579ae33f3e393509ed43d7ed51d6157bab45faffc1ca6d734bb649b3a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b