Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 20:09
Static task
static1
Behavioral task
behavioral1
Sample
64a03a521bc6771781c21600d4abdb1a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
64a03a521bc6771781c21600d4abdb1a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
64a03a521bc6771781c21600d4abdb1a_JaffaCakes118.html
-
Size
176KB
-
MD5
64a03a521bc6771781c21600d4abdb1a
-
SHA1
2357f07c612a5e2689421728133b1d5d4f3d9269
-
SHA256
d3a6d52e01839bf76d4d33f2ccb07e169a53992bef5a722edcced33925d9438c
-
SHA512
9844dbd4b75b32bb91b60d46289776ab45879bfc14d4d9902a0b91345487f1ca9802cb2c6de2bb5f9175cc6c2b3e50784be2bb551d7327802f15e70cd54bd2bb
-
SSDEEP
3072:8N8TvAU6U8GErvR2/Sw5/2Heqkx/5NPzGMGaG0ZbmIslihRd6RLtHtG/SkGzGqGF:MYSw5/2Heqkx/5NPazV0ZbhOxQ2alBCi
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000d9cd37765f25cb46aa9360d76eaf049cc98b18c702959d4cc8e2879c3643d165000000000e8000000002000020000000f2d777b499b0dde36fb3a7af3618ecc6ae16b0aadce99a551f4a0b75db89e34f20000000a932c7c28b912d15bbf437c3b4c8deb67cddaa762da62b1af9369ad7a2427a26400000000f72e42b6c47f30b22a029b26d21f9600496baa48f1c72a481caf8383b9469afad921f2842be37b3384612b11431a7be9bd78d83c348b97b6b38f823168df4ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AED4AC51-4869-11EF-AAA3-7AF2B84EB3D8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606d828576dcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427842288" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2388 2104 iexplore.exe 30 PID 2104 wrote to memory of 2388 2104 iexplore.exe 30 PID 2104 wrote to memory of 2388 2104 iexplore.exe 30 PID 2104 wrote to memory of 2388 2104 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\64a03a521bc6771781c21600d4abdb1a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596b93dd458ef2408ca466eb3e891bf78
SHA119ad06a09d7ac676296da051a68ecb392e4f2137
SHA256154ea790c5f73d6cae44c3cba32d3fb52c28496bfa3192aba9d1907dc0dac5aa
SHA512cf2ac8e39aa67302bb75d0736118c148b736c31e81ddcab1d4b636a5cbb62085ec4b34e0f019f68f989cb784dd8d67c583a3f57e30987f536a0c1c1b92eb1a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd711e3d183bd68382c60584cafad2fd
SHA17ef2b89f8052047f1ffc4bfc6675fd454e32ef8c
SHA256b4f6bb791e639bda728429174179cfed9a584811ce00ca3f0860c08dee804a91
SHA512aacd2b6a92c0cc6b4264052ba455178726d9c609361f7418f81776b686a107c503b9cab43bb40760a0b333e20a59b6164966f2cfef5f1cc889733572e45db600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fbdd25a60618d946cc8f98fef61399e
SHA1cf62bd2611c832bc412afdbdf26244f955136a88
SHA256026e06758b3a483a357a12e1f1c178af69550ba4d13a7fec64e84d463e6627a8
SHA5121f970e7108003e91961ce81d9549381c7c3fabd9718f551d27a6a55819d3f581cf6bd86e2c9796bf3e086f9d6a8c10be3a219b5ceb5b2a1af90fffca84fc44b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbc3d43ac8f84e42be25ecbee311c3ad
SHA1aa6031ab9934395bffad689f2ede2199b89ff78a
SHA256452c813969b6f27ec9a6ab6b632abc3c6b3b0791c22fee0a875fca8c787b89f3
SHA512daffc777a0e65c159769a568bb622c6c466598c3fa4096c3dd65447e7f423fe48035a2b5179df22c120240090424b40862588f8d1878992ce471f219b317d99e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc0766079d905acc815ee1910acaaa81
SHA16130677cc25efeb3d824790ee261ecfd80498e19
SHA256d59b38b5da873ae406edd9fa7c0e293de177c5a79b11d94db421a5edcf89076f
SHA5124ac72daddffd2636d8ab6a8b5a1feb91772d42c5ccb5c48658a3a16db25cd806368b2c29d56409c72d33404c26cde15e1b7db78917f1ea5c0ac5ee4d6e550478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525a295bd7dd8512b38331112ac0ee464
SHA1e5768d024b83c1c65ed29a0b490a822111d6d49a
SHA256a5a580b0938b1eba9ba44d75a9622a980708f86c1baa1c8618e769412dd983cc
SHA5128d8d1cc9549744f442a410fa4ed811e81edb10f3ccc93f59524919d4cec2d76b8016af9b5284e64bf0251b23711e7102f80d155f96bf35b771c97d64863157fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7031ce282f90153d7968e80b3d568a8
SHA1dd84816930a4600fa42f0851d8307df872fff306
SHA256321b4320b52dbb3ac1cb2449c642676c66d31209eaf82548c6cf8903e39c8604
SHA5125762120208e1a75c446d469a3c1e557646e46623ef94211b8667d2553fa08287b826b6e823c0d535ac1e9d0039f3e942f1ad98a3e50632bf1bb86b0fbe245af2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503d69756e000efc4c6b5548f9e6caef6
SHA12a242366d7860b8498433f3426bcc098529bd520
SHA256de43cd9448ef997a478804db832ac01d8c1329cb8ce8940b8c18936309a05a3b
SHA5122004e69c7d7120267018da8cea4ea1d72abb9afdbdfe9c1964babc06888641f0f2c1fc217d18ce3503a99740d5ae0b486b14739beeb1ecaf8ff5222c9e98ccff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bff67dcd7df526f3df4a216bcabbdf0e
SHA1bbc61ea954d3855add5c67369e0dd809503b4f0f
SHA256ba94f900507da4e1b7dea54f1b52b6a3063fe7a95d8ca42e673fcf7112b314d8
SHA51288eb80b2c353fb21bf501c6a330ce5fc92fda9111e7962ac1acc7d41f9ba6cfe92a47558e514a2ca43fe6bff0e314f14d002b3297a7665398e6272eea28b1549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513912585ae781d7f1af17cc1371a6f24
SHA132f2fdf9370d65cc93cdf3f65d8d87ae7e889f01
SHA2563739deb769d339becce98b5b6e12a07e20abacb70e380471b039255434714420
SHA512e739e07f0f02dec20232bbd54f6e125733ceb1e0f681df22901da3b1164d3baadcaf11db8bdbc14717ad7ec73b6096bb60bea4ac05fe7fc9733bc441c05e9e9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5422027217e77a381f3343d9364766abc
SHA15f70212e2373246ce9c5df5755711fb01e78bb01
SHA25640d761265e9aedfbeaf68cf96b0d470738a1216cb27427b8300b5c3bd95a48e6
SHA5127a9699fa47e7ffac9ff9c2924a82c5310172d65feb24d1274a42eb8533140e2c419a6d5d4410de6e500646956825948ab10af06d9f356663bf7a448ea1de72eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a585a0ee615fb2ad685a2431cd0561c
SHA13effce039c032e1d8760c19848f047b6e167a0f8
SHA2569f3211889df749f4695989989206aebf3f8802fa352d6d923851022c1b45790a
SHA5122e54c74ab35c20cd9588c2c081803c027bed4ed82c0377ec973393dd83b6ec01ea0dcf438dd4cd7d15dce322406a2f40b896d832fa00195f0f54a60d42f91249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533fd64ddf6f9b50b80d36fbaf8ac62a8
SHA151ea0c082b8cdeea2b3f7a73d927e10a71c10eb1
SHA2569abbd62c5438063f25b26cc1ba7ce96e52f87c3416085cb9fa0c2f9f1147bb93
SHA512eae5a2a1bcc33899038f7489e0016c4d23fd1e57403c938d7b70776ff60d233b774363306df19fb5bb85a5c38086e0378d76e6ccc5089fb5f35e47e7ab524458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fcf1429c348793d65e33bc2d45d7bcc
SHA1326caa9f3ec3944f08babfcd72aa43eb13c054e4
SHA256ccd10aaf9a09d71b69d347626b3a9dfcc2ffa6bb8766c94bced7175ca5ad68fd
SHA512ba855e34ba79009d013c2170c5c9c072efe22547b1f6df4a7b340069a5371fceebc5a65e5cf33d635c39ae9ed14d455b45cebc1ce0cf877a591ace687c8ca5f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be3149f65da74dba172a08bcfd076a64
SHA137a7eae8a2bcf6f5467f4f5760b455727040795f
SHA256fdc1aa3d6ca5bc3d40519d44e510702853c4982d7fd279da536b7d7b05e559a8
SHA512247a820ea8a260b8551ab3af4bd67d030eb96209f36da83f20d1fc10279db711dce42f9c42ecf08be90d0447fe022f0eb5d5ebe614928edda51b42a7b3edbf66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb819d3102ea130c13647468410d47de
SHA187621194354fee3178788fe54bf5936cd8a8ddfc
SHA256526441dd803a671d0a28738b8b51b1496b0ad002afef769d6ed6e74c67c84d0f
SHA51287f6039da123be71b2a13fc60232b4c733a577fc0015b090f366d93ec942446204ee9e34d4b82fb2cec512509251e5069963211b176226e68902c7710d3275cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eeb262ea9551deeb9e644aa15959fff
SHA1e5d02339e42469ee8ba3e090169e03bbb16e15a9
SHA256e84915fdc3071309f5ad367102377be8a0a66ac0d1ecea607c4d351ae5d6dbd7
SHA51216021d814b9a217a77b9b98a45e008f617586d35f840f9bb5b916d6d7ccb20e29bad9e26f474b6b712f903e1936c03bf6b4364395eb8ec1e3a8d0a6fe4d79e16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a99be2c539c2d4add9a0237dacaee22c
SHA1747a53f9d3c70d8278b0b0709235d6b780b13042
SHA256cd797ff33c4853898e5723f1cfc4df84b32c39617ee26b7aa8383b6b6b67a254
SHA51243f153917a2ab99f4b06229092c56fc9356001b1278d75c8169b2ca35e704982a778c2c893f392b1626636c27788286aa7e2babd6d4b1eacf825767e3160df26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebeaee5c9d1bdc46cfa290f5332aebd3
SHA15658eb2b5a1b1d33c388243a259f001163dca57d
SHA2568d9a130d17a9c2598bf16b552185c55b21e89fc4d5faa1256587e9496b3d6fda
SHA51236a208dca6188c5a545b59aca9b4c8cab67e8131c2c35922a60949a58511e3d539f6d1fe30b24b89a5820d3eb6bcd4fd84e6758f7de9bac249d32f104a3e9f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539f73a744f89eef6fc55ecf1cde3a77b
SHA1d15c331c2b308206496173471b83fc9d7e547dae
SHA2564806e90381cda2f694779d51215b761423d368ef87233d3654c25448f70b012c
SHA51254ca4ea49879658e93ec46306af93a327065e9130383cd57cdc5bced0afe210619f9d5f7684a4d542798bbbb9e878f23aaf278e5861d23196c85811b5f2118ad
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M7H6XY0V\recaptcha__fr[1].js
Filesize536KB
MD54b4b5a7f12bccaff8e945827bee67648
SHA1a4ff1faf799429da465e1eedc10f054cc012c229
SHA256e8619cdd37794e9a407e2e5ff4de787a119eb395c459b5c6ce0b4d936d266cc3
SHA512cdfdb5e0b0b11a0af298acbeca364c6b4ce65766ff20fc75dbef13cd118f335a68a1aba23ea29fce85bd0865068ad00a23f6015d79c66dcf1789fb011a1b24da
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b