Analysis
-
max time kernel
138s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 04:10
Static task
static1
Behavioral task
behavioral1
Sample
0ddadc0ee3a018632a5c4daed6423cad_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ddadc0ee3a018632a5c4daed6423cad_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0ddadc0ee3a018632a5c4daed6423cad_JaffaCakes118.html
-
Size
214KB
-
MD5
0ddadc0ee3a018632a5c4daed6423cad
-
SHA1
96c6144196589d1326d2368148a1b4b1c38be065
-
SHA256
1ba541b85861fb2b932fd10121ff416c3fac43b1a909cf2d9ec5cb3598a4038a
-
SHA512
324117749df816aad6174ce5c99d54282d4927fc82281bf9d3ea7d266dfb13c3623b1681fdc64da77f353a3592c2020d789d9abc5dc81de17331e0b9ccbd337d
-
SSDEEP
3072:vrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJa0:jz9VxLY7iAVLTBQJlH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309e3b824a15db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434090497" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6D8BEE91-813D-11EF-976E-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000ae578933e70b15794c8c4e879a35279e4318d3a1320b41d744250b69f8fdce73000000000e800000000200002000000091206a6e158fa3bb5f752374ad32ac7313d65377c55710a8c76fe12d79ed943620000000555efae96302fd8072032cd5e856c7adae87fc78eced093a5f40da52976fbb5d40000000ab92b7f264288cd4c4d707eafdab1b1299d967e1326b5d36729d3825b8da5ef35799a1057df95224eeafc9238f5428c6dce5941a233ebced0ea165d007d6d557 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 3044 2372 iexplore.exe 31 PID 2372 wrote to memory of 3044 2372 iexplore.exe 31 PID 2372 wrote to memory of 3044 2372 iexplore.exe 31 PID 2372 wrote to memory of 3044 2372 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ddadc0ee3a018632a5c4daed6423cad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575796989678dd86b659f5ec3c356cf40
SHA196f76870e1752ef6228a81ae3ad32cda76c38930
SHA256382099a2b2e29ed6f799746ed0c5ece1c4b94ab1a45dc07ec3d93f11fbe72b34
SHA5122a83755cbb399f66761252b60500b4bb1236f3900061297cbeae72d11fed7ecc933c1cc8ed6ad60154488139c0dce881f74db6985099b072477a1309d8c5e08f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574db52c215d595f93c33bcb380c99026
SHA1425dd26a4809e91c9102414b18e135c27b19bc86
SHA2568570c2d1b92fed833fdbc427148764436484fdbb4e5eb53300d25f172e1125d4
SHA512e9de6b404b5ff8fcdc2a68441adea1f161e16d008f28dba87b254adbe18166f6dcd3d90d37f2290ce2ba770d72ed9608f86b30dbb43e433e2f349067a1863567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56888c20848cb1893370540b4b55bde57
SHA1a74792fd07b0759a4c784697904d9fdf77c6de19
SHA2566275975d7cce92bb7df9c070f4dfc4482c87a03d579e852684c8ac0a161be6e3
SHA512dd76fab0c9d56f702c1a80745507b6ec639f8cebb9ccf3680e06d4f92de337e6f0c85e23cc92cebd5392d32d07da46b084510770b25a45171d5aa297d3af690e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db902b516b3e55c6ed20e4497151f488
SHA163974775de76a9e766b84e92d8cbc968a84b419d
SHA2565e38ad0aeaed9973defca393c41205c2288de556e66ad5a3fb766f63db2ed31d
SHA512c74b91db04a1f4d27884eb70a564ee67a549651f06015cdaab23fb70b24d4838580b26d1c6549792cee042ed45d8a8678887918046246b4dfe72ef125f6bd4dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fb8465a204200adce1bb7dea4b192ff
SHA166a67e0e04689e8bfe5ff6aa1fd18513f1ab15f9
SHA256a8d41b8866b6c3fa42ebff41d8e0d09a264cd6f271999f66a26a2d612961d74f
SHA512686f584ea37f69253363c3c93a6670d347f7e41afd105c46dcc67faf67655bb20e8b444b16e77ce147570366292a860b2b4a9108e4a12006e63dd1565ac06b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dbde35b33ffccb21119e0fc35cd1c35
SHA1fe416a6cd5eaa8384be45175fd4bf562fed79497
SHA2562b315656129fe77fca0e437db6dd2a23c9e8a4b60c2841a53248bd25a6f3e056
SHA512fcca1d60ee0c4c540f2118e7aeb5d130ee7da27e35ec20b6f622ab27b20c6e7c5847814d731f3114f0d38472374a00f6a63b627b70635ec92f7036c302dc0d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58db7bf4b93de6e870307edc95a0a8d3e
SHA1efc13139ff2c9b0ce4654930b485c92d2b9ba44b
SHA256a6d13acb5dec3229be985b198c589abbf7c32a041dcd144b614272ef175e3675
SHA5123ca62f985eb8b18c4e5ace6a384078d465c07b82568f19697076eeeb977ee83e9fa9e940c3fafa5c50ff2dc001e875ad0ee5ccad3eef5b76ebf717903949ab1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595bd62eadca5af2101bff5ccaee498ca
SHA11c2c612f036439cb633b70c4a5910fdf21bc2b08
SHA256ab556bb1335173301ca6bcb991d467570fbeb720a3945d4e9784fa219672b2d1
SHA5121e0789a00ffee1d7f7da3c4134946ed744005e0c569799946824a111bfba3331f473656e5331f5ef87153ce7b0bcc989f6ea47896558e83423a654d214b299ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b34d496630e84a0bd5f1ff90d6a9eabd
SHA1b057f9930d9b90a98575c06f6393b20782250bfd
SHA256ef407bb0d268702e6264c44be42a2b6fa4a59add8b128e34551c42a20e6cfec5
SHA5128f3c7a9e628508d8f7ccf381df8d10574ac831f76d2b0571b6d8c7572349babd1923d18575ffcf856e63654a521b985dcd53915598135ca56020995f46ce505f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879256cc07302bc8346008880e80ba46
SHA1a0a8ac24b0187245a56581d86bf80ba23c158a50
SHA2562d2c2a795c7f9268f6267a770e04b896b9a9162e5d71996141af609b7a7f718b
SHA512347e35c5505acac11c4820a23b3e1c8f652f2faf742ef9f5270a8c5c648b4f64270d7dd9f1bbb446cd151a16312e60473c7c978743f429c75860f21241ed09ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547f875d1643d3bfac7a9290d752078b0
SHA13f154628bfc69ae9a99e6c8edb1ce625c0d7111d
SHA256948253b045d6f4b5e018c556c79219e3d4f780ff10a8db0eb14f806c5ebfa935
SHA51228ddf45e358774bfda3eb5ee6137a4f20c93f17dee9439ad77b7ce79b2810004abbf0f75b3dc7a76e97f3a8af6a7c46725a5e45c6898bc5ef4a2c43e501dbce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df4f5e1fa70ad6301ec0fb25175208d4
SHA10565a5bde350a52058015081101317995f89b90a
SHA2563de65e153ee088ffe4c4bab9cdd561653a6bb15bf1a740ad6f6d5d1e12a45ec6
SHA5121457a33e81cfc018fd8f10fa89bcd308a85f73c7f07ea6751110210d22c4d86a2e16753284744ff8fbcbf51a1077da01a651d24ffd2497601e60c21793fe5c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59213061375a7711e6aabc65bef5adcf5
SHA1fa7a8b8bc177c1c9490afca0ac66eb11843e3098
SHA256355eca3731bf14cc3ca674d6ac2da424d35b60a2e110bed0fd74b6ac9b9e8766
SHA512f2bf3875873ea16574569997ba31c44e0548f716482f55dc90fb4821392bbc71bf30e326f6b18f78bdd0b1da84a1d971716d1f92cf6f260870f3fc371fadd658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59908f05c982cdc043baa45e111669c00
SHA14345e1ae09c8412c4d695f35b82cb2177afcc2c6
SHA256b3faf184b2eba59b69884248dc8bdeb230a9a2bc16003adfa8f56543dfd209bf
SHA5129eff3a453434ea44ec376557c054f67a56d68d61491b3b2072022a23571e3db75501dcdd78343dff87b531f78b14ae7b432b777759c03aa917c2a4eedd9155b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db590016e236a87975c3d20c75e14142
SHA1d0ced2d93bc1426b0d68361198af96d4dd96100d
SHA256633ac5150eb1c26d495f47be28f98dc9e7313949f00f8f1363e440a1c9940bb9
SHA512915bb75be7a707dbe354291c7b47595663de83f3396c0c9958d993a82b0224a5c0fcc6722e22acdb65d2aaf4806a07f516192090bf80cee86c604d7c2f6fbb53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533ab2251d1bcb31ed02476f69b9ea77f
SHA1d0a5847c9d8b1814c68b35e52dc3e27951446aa3
SHA2565d176d761ed07a5b41b042ed337a15116959e2a7767cf255a094f0d50d26f2f8
SHA5124208bece8ede03eadb00ba9ed85f109b444508c05270fcf6fc4424b1b8b5d7a4a9f03e43c61e5db247840b7f50ab79917d9405d085531e10ac659950077039c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59848134bb84c070a4b61773e5875e279
SHA122d98263bb63ffc65f459a3060d6d184bddc1879
SHA256da459c0d42940f66085836e2461c3c15ad9a26ea7481c3dc6feee1e99694091a
SHA51258d4f0f0676f10006e397fb6f768ce9805a2bf3b302a9052225d443992a9c79cabc5e21016f1f940a6be4ecf2d2d84f07ee317b3ce43501c648e77658629ed21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5734f486df049115e113159b7c356fbef
SHA1a09115599abc51d24c4bd12e4523a9f48ee9225b
SHA25630c567afe5928a7446f8ddc25799829e270d12412b0853e6ef7a06bdaf66c5d3
SHA512d62ed15508bc52414be061652ba7e75abf264ee0b9c1fa7a892fd55378bd724f200e74ad21c8e52b3805fada532da3984e14a599742ab418c3bdb4a6324785e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac56d259a40b5b49d31970e02b28eac7
SHA18d10a5319f1537931c5f8ed0523049a539ea8ca1
SHA256f2656315cf1594403d53dfcb06c82b8a2e30c2ada3f192ceecf40449a0f54010
SHA5124fc973f4329fce396f2b945777487dbda684dbcb5ad4a187e101f33a8a35da9f42a4fbe685abb78dbcc0eabc98db92129b33b7bab31146984724cea7f2f00e3c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b