Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
5404535d2ba3d0741b43f6e903adcc8b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5404535d2ba3d0741b43f6e903adcc8b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5404535d2ba3d0741b43f6e903adcc8b_JaffaCakes118.html
-
Size
18KB
-
MD5
5404535d2ba3d0741b43f6e903adcc8b
-
SHA1
5f985fa59fb760d3ad0db0622da470d8400f9477
-
SHA256
a3794dd05fffda4eebdf503f852bb6e3df81ce4a2086ecb3ec5ee807ef55fe24
-
SHA512
3235ae21c33c57df27744b661cd0a7569e193f02938577012390fd4353411a1dd557d5af6fd3ad9a226e6f2c67f09bcc2fc45a5b2cc2e534d241a920949402fa
-
SSDEEP
192:SI1WduAa5H77Gz7nOb8u2rn5OY0Khb2XJvOFZSf:SIPb7kOwu21kKJc+w
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435365457" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000004eda598880c51bb9ffd6cc3b2a8d1d569432e2921cd0c5b6b6d36da496ec0089000000000e80000000020000200000003325042ecfa4374475a4bae78e877b7c932047ae8e766368811a61fa2e4df43d20000000a3fbf92fcaad85e6cc8b5dab89de1d935a85265389973f312ecb96422d607316400000001aa0a2ab1c466bff8dd6a6c14e5dd7542b14dcddd447fa3afe5b0e1d93b1a474bd29de0e18d74e4d34015dfbc57a8ce6dfa0ce703ba5d25cefebb388d8768d3d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3044e5c0e220db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC607DA1-8CD5-11EF-86C1-D60C98DC526F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2508 3000 iexplore.exe 30 PID 3000 wrote to memory of 2508 3000 iexplore.exe 30 PID 3000 wrote to memory of 2508 3000 iexplore.exe 30 PID 3000 wrote to memory of 2508 3000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5404535d2ba3d0741b43f6e903adcc8b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544c2423300b02934f3059cb6c4897f36
SHA13dfa68c808c45ef09c7858aaed8f183fb79b0b30
SHA256cb415a78a80ef1a704ef1f96609e8965e1810156cf0d510c2debce0784946cfe
SHA512d2c681d0d560dcbd3dc3562e21e2c040979d1115fe4c10197da7241dc571409ed120e1b2e815de22762ace07dc217f0d750a1d60fd512e69bb8459aefe589dd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59461049ef9cc8c189b10c3043e41222e
SHA12aae5b686e7c1a14ebf68d663f4c4c2abb0f362a
SHA256a3f5f4af5a8e152aceb243b8cf8f69ab39041daedabd8f3554d868f9b6cac2f5
SHA5126478f70df0adf17c669ae2b34333c7e3c6ca75e6d5a73fbbf412a1aee56466c9264aa29eea178d5c495997fdfa39a242d59d5b50da7c958b190241e700562687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d843877419a6f611b39d0b26bab8a314
SHA1a11a01ee902802c795918dc0dcd7019fdc8345d9
SHA2562893cc82b604f896196a8261d5047d69a4c86d1a0aff9b6aef51e19b9eb1dba0
SHA5123ba50f42cb01655edc8461c1ea16589fd476bbb98634eef2f4389776369069ff8950c7adccf3659d2c4bc8c94d13845249cdda0d0dcfa5b0d2997a41465acb26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51417b5840457e15a3c325f0855e95fed
SHA14b2d337a079cd670749be07edf03913bdb0640fe
SHA256e1591656f82a1707dfe0b368a93c7b2d557ecb60bcc1d3b189678838b25c6af1
SHA512b85b23589ccebff8aab3b0a7b8f164529d56eec96c597c1cf0066b6fc0019a2a471cfa254e814645a3f81e5e5bd3ef33473326bd53dbc86d0e9891328e61b03e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8335f1bf0b1552ab085675fc893dd4e
SHA15959fead27908543a87e5c258dd46c53afafddc9
SHA256144f03f0ff0968c5d3c56c982eaba1117c86f3129a616abac1cb131fc492b6f6
SHA512cafbe56fc45be001756ae8d222fe298df16242df0a8ada75a5c7e5235939e668169e93a42c0ee8462e4b738a195a660c62f30438b6503b203e43fabebe3a0a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524f15d8a4d07dfb78f3652dd5385d217
SHA1532154812e6355756b97959977a8aed9c16f221f
SHA256a88fa821901743d99f66a5958253cb3747917833a65328ca0774c03032ff6bea
SHA512919f5146dca28560db4862a2e7ea0205b5c7d3d6e3d75b4de05537474d29a1b8a3a3abcccc5140eed662c202e7b86561233c09294134da0cfbf7464eac009947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57491fb4c342effe0144f0cde53543409
SHA17f146994710ae0ae6a231efbdf8fbc5639bc4dc2
SHA2561aa83282740430dab01b955aa8f378cce0e5f5e9dc3d37bbec8efb2725f5f1d1
SHA51215ccc7da3e1c7899198dc211e1358b5897fd100a160b3e768803750b345bac032362e4b7e227dea0ea658c7e9da231e1ceacbdf802cdf0553abd09a6ff149a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529364c127cb630c63b3eda5327bc81a3
SHA1f05f5c51a9f21a6481b80967bfc61e739e36d43a
SHA256187e8c8be3c392cfea8b16e936334c762a6f626181a34e49321ddb4b32b3e7ef
SHA5125dca16787cfb69b81aebc0e13db43780e6131ecf74936d817d6f59f18b1367de51539b896b2e0d799bf6a1ce0d40f9d68a26d2f657ff46eb18d45bdc6883be3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fbb9295e830cbb1e821a23683e96310
SHA14aa3b2914e6807ba391f9828b3e1176de66d5dc0
SHA256d16e1a2b627733a72763a2f11a06bd59c18609ae85634f62ae75c0721ebf1b42
SHA512b55b6c46921fd67ee56b568ada107c1e81a13212823ad99ff8e4fe0865ba4deec8f44fafd947dbc175a27c00103812c1191e27e3c0906ee5953bc9080509e56f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502d367906dd3e01a958bf0fb46a308e0
SHA15b0d3201077f849839660662d352379125173de7
SHA2568ec4813f7de4b6ee9eaf8a1423227947726d268349ed5f9ac765af2a0ffd8547
SHA512ba73e1a000aaa05415fd92b4ee1c3e59e6c68ebf8cfeab179d1d74818e00ea00b0b993028e600de310cd8b559fa451ee3f436ebb74c5a7db51ac18237c523f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556704157f0ca2f4480f994b2f22581ca
SHA1f3d84aea3073828788147312f897672a5787a77e
SHA25617f1eea336aa880db79b9ecee26e651cb22c9ab4f2bf4a6262c91c2501535f55
SHA5126293b3e4aae90a2c4d5c4f507fb2735b000d95a9ea652998309ee17c93d48bec8aede1c443a2191001cc7d44924efd00835bc82d16d38127250e4bd91c238c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b0f445509c74ade8c0e9a104d852bb
SHA15ae31e490acadbe65d8c26ecef2d14801ed3ef35
SHA2569232bca21e3b304de9af03231d9b023775ae77ad0b3c8638a8e8186093a61e32
SHA5121aad52c2e0b853b2dbf7b6ff65ce73b253226cdda1c0ee6fe1fd527654355627fbd5eddeb62d82af99b0a778685ef816280eb60c91729f55d66ffb49b879c903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598207e9bec9d2bc2f586a10163c37820
SHA106edc36be4fba99ca2eb94bc3fd124503e2b4731
SHA256f5c52961d5a501b1988b2b815eeaded46a925e4e0f90eb9c697933503bedb2e4
SHA51289af1dff895ef14d0b83be4ae8c53071c96e270e19137d8bd02ec3e7c8dddc0f7dba7e5411978e6e1ec72721c3746a2edf63313b6649523304f1787cf2c424a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55419b4587711617aec4fe9e0469e4c49
SHA154e33d3ba63e0648ac5e07ca9114324c5942468d
SHA2568c27602f77b461791e98ef4b52649df1c75fef3be4f87e7a30847ca1cab475f5
SHA5129b4d508098492c474e12cec5681fc5d325f30d9298b2bea15ceb5c5d56a43e2b4e2253e8804994d7e535533795e60b5e1b3adbe92f765399626fb87da59aca83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586a4198f45059b217202f7fc0bb6c39d
SHA1d9b057e3c4ff737f8cc1a75327e0bb9cf75f9338
SHA25695a0d273d01f9d3442c5c908b514ce3fed8de5dccd8ac7031920792ab3bc50dd
SHA512f61b9d099642b3a2c8ad4f4ab32efe8f20f71458374a0ae015b943112e443acde65f3ca5bcb0dd13883f33337ab084b53660a490eda233e2aca65189c50a8e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd0dd31c2564f75d63ca5a437c3c3e4a
SHA15eec8667d814e4c060958f6efac18329dbcb2af9
SHA256fac6dd597c3e0edde4d104183514ae6a32e6dddc2a82e70291804401f5ed853b
SHA5121bffc393d7cacd2dadcd24ae8d28cdf5f2443e5aa5425cbc70a96cccd579db8ca86045a73f2eb0b74e24d254135c4d7c8fe40b2c7156c53adbc538240df420fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527cafe42cd45e21001adb11235f2a71c
SHA11683ab891053178171bb2713b5b94d91a5fb29f0
SHA25667c05a8a66948792caf576a38d8e6f665a0df7027912157c35d3e8e25ece7c37
SHA512fa7000d8464ec6ea6b9a7e7dfaad293f8a9753c0c86df3ae4cbb60cae13ee520c688daead4b54c761b068d50110da77e471eec540e2eb241dbe0f91131358f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5735eba9340607b6126d9807bed7be6a4
SHA1504f2bb54f1454fbccb99fa576077d86b36a47d4
SHA25684d533c36036622ae5639f6b10e99fcbc64e183582e1ce8ec33c978bf6801d16
SHA5121a73e2cf46db83eb1711125ef718d3117a302b6b4336e0b2c7d52673a6e753cfaadccb37843e3cfb3297b7b7864b5a0e1eec34ba17981f309cbdceb47c30b390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cea7173ad3c329f40706d275ef40084
SHA1891767657653240e4e8537560c7c635bac8ad206
SHA2565b1624fee6154342ea27c59c7d6ae3dbad2a1304009f8ace908e95c1dd515baa
SHA51256d00660847886044aed06841a7ed51fed1eeab5ef19139c8068835b9059e883fb1e71c1343f4e8084800409e6c8796322db49d00d40395d99f2dae023fbd6be
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b