Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
386a6c435a631a6d2d1091e6edcf4da7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
386a6c435a631a6d2d1091e6edcf4da7_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
386a6c435a631a6d2d1091e6edcf4da7_JaffaCakes118.html
-
Size
11KB
-
MD5
386a6c435a631a6d2d1091e6edcf4da7
-
SHA1
1d872124e8f94c4b23dc61e187c418ff8b210fb9
-
SHA256
fd51c01f89bf8e988532165194eece3db6a352e92d186b1267fb033171c713f4
-
SHA512
a15d8f8abe077a22238ccc9e16b7c0f5b2a9ddaab169a14569db81605d6209693838b2f0cbbfa07d011ae2baa3cddbce1c1693646b0fe5860f013b53d8eecf12
-
SSDEEP
192:Mt5aQOZ26xpm/Y/C43wJmrQGyQdDB/5OkEIeYOJTEKICrfRsE0JKWiRiDI:Mt5TOZ2rRSxGHjJsEIIgI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434868989" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000068014402092508769defb9c43a35add1c40b657a65539bef948ac722034baa79000000000e8000000002000020000000a7d14c0747946d355529daea854e6ae21fdfdf6ec7111788631531f0b855a15e200000004e6b45a6b4fdc0601f8475e958f7a3d9f58dffb7d32a1bf94152da756e2bafb64000000051f3f482d8779b74406a830473407d6efa8376dece4f1914687e9ec418b3418210a5140dd85ff1bc221a6705c4d368bcce3236cf4fa3f283c749b389d6cb09dc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d04b89d55e1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE5AD971-8851-11EF-85C5-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1152 iexplore.exe 1152 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2092 1152 iexplore.exe 31 PID 1152 wrote to memory of 2092 1152 iexplore.exe 31 PID 1152 wrote to memory of 2092 1152 iexplore.exe 31 PID 1152 wrote to memory of 2092 1152 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\386a6c435a631a6d2d1091e6edcf4da7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c60009bcae8b8031185255b6c7db95d1
SHA1316603e70766764e606c9944df78c330cebad107
SHA25697eb7e49475a48bb1cfad31da1b8202a59c70277c205a245e11ee31e13759716
SHA5125188840e3de098f48c20af2c0b47816a577cc3cec9a58651d2a1978f4755dbc3fd0e63c5cb80f972deba59fef7b31ad70afa01f2926ca9529d398401e9adbae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5524610a702a9429b4749c475480bfdef
SHA1da382ab1ff3e520e873a584ad64711a131f04d39
SHA256e7e5569230dc98a74e1a0a44f9cc606134a5e071f7cb89a83897db3cce425839
SHA512cbd46f6455782a94a30de1078a68336789050d9daba788e105ef9c7c76cbedff96e6180110f4f1994053c0cae5d815f1dd41fdba3369390cd2f05f9d42ac1a5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd775f5ceb0c2d537b7f2310b59a5fe6
SHA1f433ecca5263ce02739531f63109c8fa1ae50e5d
SHA256cb3063d12fc5573f3003e714774727fc64d7e3be40315dc9d6d2d1a1d8740fb0
SHA512335b4fad97e4c3b98ec833efc2f1dc30fc457622fdf78d6b13628238a7f5bf791dfaeeec764aa0cf9ca1cb5b12a2d141277e68155bd76e66a000546293e6f078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ded2301a84e1c74eb5adc2431525133
SHA1fd6ca1ce6d2869a2efcf82c48a731c505bd4babd
SHA2561a044e50cf28e97ab266f6f0e598e2737a01f312c676eacf57d95fb83df31a85
SHA5125d5ad19c37de48c94b78d5b8de2f30b0333f753f2b5472126af3d0db25597ea9cdbdb60e538d58ab90cc322cab47835ed0e544637ff5a2442066bf8705766d9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d021e7481e571ec8252cf16d4d4027
SHA11787bff9d9702043371af6233399709abcb88c94
SHA256a0d7eb33797df70dc1b9d760c97349a77130b471a07c457c4df7a24402b50924
SHA512989391449c809e6ae27fbb16e1c3c3554fda1c7888ab339b2aacc003b0a7f12d3c7d37629305d3bb5afa04d9e571c2ebb4c02293781b99f3dd117d758fc4d158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faf8b84c947b8e82c1b3227c7a0fd591
SHA15e5f2953b69e7ae064018a341af02f385a13b959
SHA2568e87314b108e10cf01313e4a9727861b7fb9ff59d5cb7950b236d7b39fd9c36c
SHA5127dd87cfe8ce94fd4b7dc6b1e16ecd681b9b62f493d10504bc37acb68b5810b743240e20b671215752c3c73e6493da4c603411c6ebc39617608365571b5b6a861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b58851c5c06e4c81cddbc1bc0f1b3b5
SHA1dd44acf2a5b331f233170286ddee7dd7075ad779
SHA2567c40cdbc83670ef82f76825a12bf444d77b8e4056e64e2f9d94c6c9c557c3386
SHA5123a569b7df9e06f349c825d10a1e72c17c5f835f8b9aca337122466306e55dfb4a06140d602268f86ac83937d329a8e37c52523d991c60e20d88a90e3363428dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3dc9b44f1323b73f83a082533a642e9
SHA163df03a2a45287aa9b3f0716b914c4d1de6e87e5
SHA25634fd812a128ab8a75d13a80a44d42a948d1aa2df977534b8c0051014495d5b4c
SHA512606713c406491bb8d6eed2b70dbce6d41c3c475e70b1d0f866fd0d222efc63a3c581b0dd70429368b0686e10e53bae42d1e66795c11c096584e5ea175d7657fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff77d922ab8a23d0fc6966ca773c0118
SHA1979792a1f2cb8dfc1b04a7f10df51371e471bae7
SHA256ee61b5e93a7473f74b389aec4611abca909ad90cd1dddd36d8e0ca47fdeebfc6
SHA512953ad1b45c617f853b57a596686c1ae679948f8f73245fefd22c8a118496f94179622dcae2c3b11ca67e2662ed4581772ca26200324f900d649b246e990b871b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad8cc033c0a9e68b10ab3ec76356af0
SHA1ffe002d0e208436ca6471bfaca59e33b0651fb83
SHA2568c5de98aa1728505f45c1477e0bcd40c0ab6ea111d8ced0d30b7cbbf06232a41
SHA5122a00107b74607a6d61054470d405e2cad9a5b66cfb34cf96e3b28ddd01b382e6f304fe2819c4fd5bfa8b1fe78b387fe4addfe59d59215029ff290bc501f3d9c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5315cd1c88c5166de532ff359fae0b6a5
SHA119b01fd8d984cbc7fdd26b4543d88b0b75186816
SHA256a254c273ca41e3f2d1ebd67faf9c35eca8116dfd3f3cc2e3aff847b6bdf5a7e0
SHA51208b1fac8bc9968f09b0f13b845ea8f45967f393b17acbea4e4affc3eccaf9fec83363e1fec17551e27fa2f1ad673af9d3eab8809d4a1ceb980d3f02ac724bc02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5459be04693310c9bb9c1539c03334bab
SHA199362616d4f0974e4e5b44155f5d246339590d68
SHA256f5e13cd30237f370e2d3bf0083a4e5840fdf2502453c7c1415e28305ea9cab36
SHA5125fa3df839a72bd3243a195694501772f10e22aad0cd5c82453d82cf1b58335a586fa28be885669c6144b973a3f47e6566b275873e0241ea2a8b7b8e2b808ea03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a276b137b533f18d7fe0b907b5fe4678
SHA19597f53cce439b6b7da54a25441d918824777a1c
SHA25622f2fb7ef34ad734a864d9594c00b897ae5075c7f91576a112e1f42eedcf42ca
SHA51263b277eb76bd71bda031fd39da7461128f591c64176013ccce23c04feaa5a584a2016e8d844f3b5d5b4ff355ef38744bfa1b92a859fe444fcb93e48eea9d6e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594b7e74ba3679b3c810754167572778d
SHA1e8e0049450da516e436e853955e204fdb1205975
SHA256832601df6f9ab307efd1d87916516032198e7e275431b4320c48a20e1e12a9e7
SHA512b3c9b4dca2c233917432b55aa9d39c5814e83694da49efdfe08f7c62c94a15018313ae20341961047aaad1065d4f78c9465c58f9ca8809c7ca81169c48cd0dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5034c71ef5a105a077ef80a7c1e52a7a2
SHA1a06f76194d25afb887b53e2510a05dc74e115846
SHA256dd996e91d7c1e875ea1752eda7c21284a4c0184a951443535f03dba13b84f463
SHA5124e858212b84963dd9841e296ecf226f38345045d0a37e3df3bf760893de026eab9a2cb2ce24d5d1436f7ac05db7ffaf6897dcbefa3a94f361988a902511c6dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f35ae41eb33ced30f53da7a7af661a30
SHA185d084b18523ddde474ab6443202f40a75a974d9
SHA2569487f692431bc80f6a7312df26df57387165db248fd81ca9ba1ecb69e0a7a1fd
SHA512d32c94f3edd971700afc275bed7c017b34cd7aedb921ac01f94cbe2efd2ac463ee8863e4af2c6293692b6eef86ae6b9b825c1fd89f948f3c16954074df0ea317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5b5e5f69718b60dc020d855332bf54c
SHA1496f68b8162e3037a3bc49e49c07a60ff555e0cc
SHA256f621043cae9496fa7f38331c76fd2dcfe3b7d2b8bf49419ab29a47e9635591fc
SHA51205cb94830b9b9fcc4c08a4b227fc125e2e6279b150a760cdf0f36d01226fb2b5516a50b3ee4e3ee20380f57c8e3389dca3d3f319960ef56ee7bae38a6bf0e975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8592a10fcd462197de4597a7c0d566b
SHA1b630afae616accb13214e39f61497a83907e9a56
SHA25648e37e896a41d849ca39d60fa121495d35fac3042aa918426a3d7ab02d289167
SHA5122da9aa455e836e502580058466d8f69a52216d444abfc74455185d21c25a7b8c1ceb1e173ad19673eaa935133a8dc30cb1203dbd16c2d1f31379d640490c0231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5de76b643881221d30e21777667114797
SHA1fc5eb1f44e57e16022ab4e0af34f3a2cf463d660
SHA25687518ec6a2c228a21a58639ae2bdb5d3aaf3cf140ab9227573cec3f65b40168c
SHA512894477bd3840a6a58033b9057ab9897fbfa6c654b956ab09ae6733d05793b9257b8d216c8da77a6002c85186d622a9b99a45a8f043d17fbb3721fa06b3f0e612
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b