Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 09:39
Static task
static1
Behavioral task
behavioral1
Sample
4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe
-
Size
212KB
-
MD5
4544905533d3f08b848005ff7f39d81c
-
SHA1
ebe1b7783456173bedd19db69ac6474aa93c17f2
-
SHA256
f2412077015634a72a02d7329f2ef77a7958db7120d2327273aeedcb3348c49a
-
SHA512
2659371d27a65fa43ef0edb51957514d093e0bdfd0e37f35e17f3e4616792ae5433f23f99845c8bc71353da4a33660c641080a7b1bceec1c72e77084201c0137
-
SSDEEP
6144:ibOlDqAPQ3lYksrGI43QuknYDBKqfOorMcemcRqnVwM8:i6lDqA43G7C13QuknYDBKqfOorMcemip
Malware Config
Signatures
-
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Spy-Net\server.exe 4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Spy-Net\ 4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe File created C:\Windows\SysWOW64\Spy-Net\Spy-Net.dll 4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Spy-Net\Spy-Net.dll 4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe File created C:\Windows\SysWOW64\Spy-Net\server.exe 4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2252 set thread context of 2876 2252 4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe 31 -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427111821" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED35D3D1-41C4-11EF-AEC5-4605CC5911A3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2252 4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2876 2252 4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe 31 PID 2252 wrote to memory of 2876 2252 4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe 31 PID 2252 wrote to memory of 2876 2252 4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe 31 PID 2252 wrote to memory of 2876 2252 4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe 31 PID 2252 wrote to memory of 2876 2252 4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe 31 PID 2252 wrote to memory of 1256 2252 4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe 21 PID 2252 wrote to memory of 1256 2252 4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe 21 PID 2252 wrote to memory of 1256 2252 4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe 21 PID 2876 wrote to memory of 2740 2876 iexplore.exe 32 PID 2876 wrote to memory of 2740 2876 iexplore.exe 32 PID 2876 wrote to memory of 2740 2876 iexplore.exe 32 PID 2876 wrote to memory of 2740 2876 iexplore.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4544905533d3f08b848005ff7f39d81c_JaffaCakes118.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b99426232e953178746e6599e51c981
SHA195a111e082ebf429861fe809c8f68e7f3db04dad
SHA2568e45c39752d8ced39f5090eb72ac12e9296d234abf3ee84829f172c928c55715
SHA5126c023169ffe8ee8bf08728bfc2f23bfe3688d715afc1c1132a4f24c82674dfd5c6ca0949824124e584a9d78d6d782f12d633869dd6e87233c080e341d9726c1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5045760459909cbee4439bea673eb1977
SHA11466b65750bf052ccde6f84a7aa22d8ff237139f
SHA25624af9a253b14d3ddb3c6bbfe58ff0a229f9256802fda0c0c15b70f61d3c3de6f
SHA5125753c68c790851c9f4fb7357ec7cd9dfadeb31b8c6a0e78452cb1ca4ba86fedcdf08cd0aa0f677791b99e287992628ba80cab7bc02c6a302b528f28aafdb6840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58037858b5d5f560b473647786e136c7e
SHA163c635dff0b9989248327de212c322bd8e48820c
SHA25613806e7d55bd68551c3e5bb1faeee6d6794e2058fec454153b5dc9f103999de2
SHA51200a7c8d42d6684ed6d6d88cc6577b60b7105b8fa0d9ad9e4aae9a23f98bd3489b2d55e9e0c91716b8474c022c5eec8cca3a6862943e30d3e45f6028f14e0d3f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d23dde213004a25eced572afc6c8912
SHA1e4d1ad6640c1d87c8e89c849dea2bf39644a399d
SHA256e41b81c25cdf5f3cbfd4bc879105488a3965322f0cf35152bc1992242994c02e
SHA512c6ba10de0a9145785d7c0626f66edf5597d3a8eb3f80aeada4f37708d12cb366f1b478848e892954924813c4cc7106934465346b52d09aaa8e31489f76c1138b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567005ceebf0f2fd6adcb4fbabe9ffe75
SHA1c2ec8b2011d12c2507a26e9d8e43f92bf197490e
SHA256a98582d9b38dc6e531a59413884977a112f12caf09895a1bbb0bfc7909298102
SHA512e3ede2c88264a2a631d32d1cda24fe456ba81251976b70ebc9d104d23028d8178d524394b4181ed8784a5e715447e248e272a2f1b8cc81a4ee51211bad088678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508ff6e7561869af1b2cb998fea287777
SHA1ea3009a2cd4a5e1f0ee5a0faa47d94cf5e7839e4
SHA25666199d856916dc8e9e7270f4997e8451cf2250938c53173a6eb67a7cf2d05eaf
SHA5123c0ac748a846592efe1f81c36c13f6bd228bca4f6cc22d4ca6cc1ac5de3050f4c62eb6133c3230cda627c28179c33efe93a8d980aeffd34fb8c4188a83f8a620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b527e6603ef78c9b4a23e30aa0625c10
SHA134dcc714873b9a3d77f9a6076f7c24a40b840733
SHA256e9ad6af2b7f4022deb9f012dc0605ef73122d9bd7289e5e2a675ab5186d28b2c
SHA512a11a76d80acbd83849d6387e77bb564b764376765d5f4f12560e6950294a6bf0807cd1b6404211848aeef55d1317a0bbfc9e8e28f8c303178083ad770c1b6197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c734102368c477e04e8c293d2c8ec98
SHA18b73726e5d4e18e0e94052ae586cdf196d21825a
SHA256bb70638e042269122cb40512e398c0111bcaff595bc9ee1e90b0fb63f6f83214
SHA512ce3915cdf0e62e5d1697746de7bacb06b116fdd04d8cf8057ca4df78fe6a09f294f338bc31603f830000cb5b7acc5787322c3997124e65a1b9e5ab8bf57aa1f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e593998c857bd5033160453e9628be14
SHA183dc8b8cf444e16d94acdca2afa4554a6a191077
SHA25645ae55a00d2f0632235d2fa3ae3b6eaa2638d8a5eabf2849ce3dce339d9bce96
SHA512846ecb0a9b0523004fb8ef46e912559fe2518a41f3dd88b01891dca716b4542cd1a9537c3b769c57e551d483359f912aebca35019d675266ad8cf7ade77954a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52056cb085aa6a8c368b30c0c3dd0e1f2
SHA13584823de2c80796f03cac1f444046422d59b760
SHA2560ed4c16f406c26d64399745af838958858152bd15ef934782f904d0b41fd92c6
SHA5121ae51f0e1df4762aa85f1ed5e7b5a6017c6eabff5288d0729d8406a1f85768304b4d37eea166eed1a45c3d5a9f22df525193f228757e236d27d9b6fde048fc09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b735cb6caa0d5cd0c19dc1d4afb7da
SHA12a2a29a13fec0f274b328cf1877e63a31b7548c1
SHA2563fa312270b3da7f1c6a8180b05d91bdedccf8a59add239feb56180e5ba66d24b
SHA5127264387a2dc0c934b383d9c287da9dc35d2b838efb1dcabd6f50c6aa831c68207b7e75d20fbdebfb24a3a361076ef516303d508552567e17b6360c18ac8c1013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a89e26681c042f7381dd176adfdcb31
SHA1251a3052d96ade090c97c244dc6271f5d8df11eb
SHA25629f74da41ae6cfae0bf840774dc9e2fead5be95c55073c60d1ceb17f97574344
SHA512c3eaddf7f6c7b7afb594061b64b4469f3cbb0b3256fa207632195e5142933a6d919870a47c0c9c2b19bf33a739c60c2d44d89ce0a8b521d6337d7d31fe037425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa8318416344568259c40a27f729f384
SHA1d1a1724ec74958c47961458c7bac3c790ca53b3e
SHA2566ad274a7c84b5dc8c069d9d8932f3fa47363b9e6a055c9b0ba385f2226aee389
SHA51265d4a45047d389affbb61e538ba89c4527bb4001e0dd7aa62557c007db9884d5f8bdff74b7c64d2d22c179143514f1b365e4e32841c4391927f0a272e0e5a70e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53150dd543f945b20b68d9f487edcd241
SHA185795e1f37d0c7ae46f20a5a2ed0e53eaf8e30bd
SHA2565468c1821fdb74dfa119045e868e29d5a2bd3456442376721067faa591b528c0
SHA512573e9a710931417541e02789aa53a33c66af320177bd994a667b44858b48ddd3b6c2ccbc18c24bd2e3e347fb204e4ffff370d60fed9def946011bd1b5d2b3c9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeadcc63f379d789641f8b77c792582b
SHA168c9371e39b6f099b2603296d6bab39cf5f2269b
SHA25609144a99a8021c546dcf5eccaccd07228071b62b38108808142a90ef52ca4af7
SHA512feebbdf5496e8e3c88c6ee0da4a0d2076e394175bb3fb734bcc1885f97ddfa4a12c0bdc370f61c6243ebf4895de89b0b1c2ed5f6d942034b9ff8e56f18e53652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b232cd8765475f97aade8412e5804a2
SHA172fd2f38131dcfd57737bc8e5f1b4f8a1d4f2d02
SHA256debd0735ac82a596ad3065ed7c02e42b47b3f58f1c1b02846121152a82329a1a
SHA51221b5d6b060f2e1329ba8aeddfd083b21f432f9b3a80c867f9fa26eb6be6f67ec373d176aaabafdd2d677299f72538cdbb4c5d17c9b24d5e2e74c8dc318604097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ada40d094b8e7425310f60e1e65b673
SHA1960427a52abdcbaeeff728afb6dee2103877af83
SHA256c76c94df638ca705c03c723bd861f4cc50e4ddbefb46f51466f937184a428252
SHA512b0be4a7b8376f7bdbd92097d81d86ddcd9af5ab9504fd0c467fcdde4f0311bd19a900879e729a2e378d1617bdf668e6f055341b84c5da75daf96c8de2a5053bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5012c71c071e6d22f0b3d6ba352b9973a
SHA1d768bd4a6a0ec209c8efc5d70d2e8149d40f97aa
SHA2568b71da2fdc8666bbc66513e84f88870b59fc8121953895a2f07d8b491d867513
SHA512a2978ea1c76617c0fca4d54b1c569ca648b18971a9bdb8443e85b0c009d00b29cdc44215ffb6e7dbc1be408c1cbad25997385b0254d010acab80f3d27c4975f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54323c6e352ef0e5e484d94f4023788b9
SHA1d3cded25cd2b534e5419c94acd01636dbdd5d161
SHA25651d6246c29c9fbd41cc39d1d04692f2e75cbac2e029fedc24bffeebc89477f01
SHA5120caa066edd2d89107b8d16542b9e4cd572cf05a12dc088677edbc85c9cbac24d322a7ee8c2a418da5638301db88d2feb2b91dd84e532c29123b21be45b0d3a64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb18d3ca62152c7124fd08d222b37523
SHA174a9dbfa26faa4dbbf79235733ce9350409b310c
SHA256fb6289a6949326b33fc73db1ce526754b12e0c786e6860247526414c2557184a
SHA512f12d67e1a7ca2a16a0108749d2e6ef36a888954372ec24d89284a464ec3ba590cd81e0ac8999d8fc6a058a821595b7f5b04cd52743f917193ef32e36c8699cc8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
212KB
MD54544905533d3f08b848005ff7f39d81c
SHA1ebe1b7783456173bedd19db69ac6474aa93c17f2
SHA256f2412077015634a72a02d7329f2ef77a7958db7120d2327273aeedcb3348c49a
SHA5122659371d27a65fa43ef0edb51957514d093e0bdfd0e37f35e17f3e4616792ae5433f23f99845c8bc71353da4a33660c641080a7b1bceec1c72e77084201c0137