Analysis
-
max time kernel
139s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 13:59
Static task
static1
Behavioral task
behavioral1
Sample
a6ed7e4524d3d377f17645ef4892a6fa_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a6ed7e4524d3d377f17645ef4892a6fa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a6ed7e4524d3d377f17645ef4892a6fa_JaffaCakes118.html
-
Size
53KB
-
MD5
a6ed7e4524d3d377f17645ef4892a6fa
-
SHA1
6ab9557186fd465ecad0425c3c5ae49993f9e22a
-
SHA256
16915670c003cd87582ce1ecbde7bde8627986d969264faaa0a8f3fdc57c12ab
-
SHA512
1e3d835a93ab657863f1369c4d0a18a8145247c9b7264132d28d98ab857418c2ffdbf21aa8312af750660ba77306b1d7e72a4e395a9bc7949f8754c404b7788a
-
SSDEEP
1536:CkgUiIakTqGivi+PyUXrunlYJ63Nj+q5VyvR0w2AzTICbb1o6/t9M/dNwIUTDmDv:CkgUiIakTqGivi+PyUXrunlYJ63Nj+q5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0cbfaf576f1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000668150b096b8234e6162e432139c6d070d4455b89c67b0ee14af323a9ef0861b000000000e8000000002000020000000fd17b29ed4db74862eaf3709b9a555ce7c9d0d1ea5bbe3e9c642c8a3b35e5b5420000000570aa7bd49fa76a9ee7940b42618864f025ec769ff16a17a188072fa3e2a5aa6400000003115b7ec7b4c9f6d51811cad1e6a7d270b1161bc98627e5a8656e625bdfc664724cdc4855ea885138d80ac2e41d151fac1900c25d0def34cd78a447da133e59b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430151455" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D69DB81-5D6A-11EF-BC23-6A4552514C55} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000e38f8d27cbf6ae810cb2eadfdb1decd91ca9101fee2af0935545193d3ce682cc000000000e8000000002000020000000296216ecb1248506110a3b25e0743d8b6b6bbfc804bf9d49a21a9ddace370bdf90000000697103561157d6134a148d922e65f2da1bf67815ec55a397fb8a65c5c73fab2eea7c40ed6e090581983d2152db206c2230ba23cca1eee326f9a5a9d6791a9562c4116cfb02d55f5d6e557d49e565f56043428611a1246e8514b50152d9110659a4023a79a1281be2b4082b5eac397baede55f0fd487cbe393b07029a24054ddf2021c40dd41e06e551885748e0971cd3400000007b447e82811226cd7bd4af107dda0878bde25acad26459a359c4164d3cb9c11712aea3f9c21dc0232871c75cc6a05a6916d0a9f32c833549f0a9bf3bdb45fc27 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2176 2360 iexplore.exe 30 PID 2360 wrote to memory of 2176 2360 iexplore.exe 30 PID 2360 wrote to memory of 2176 2360 iexplore.exe 30 PID 2360 wrote to memory of 2176 2360 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a6ed7e4524d3d377f17645ef4892a6fa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b797750f283f301332e9a2684d61c95b
SHA1deb06201442ea7fe71e9d1aace880cd311576441
SHA2566fc6b20750821957e0208c1151fbc3eaa6bb6c297e738d9b5b5b8999e5b7257b
SHA5123121a32a901e6fd871ba4e043e1e3a7619a17d63e595bc92a3e51026b0fec73fe2b7d0fe694aab903cfbe8ca15736ba861fb1bf13509b1fe5fadb22adfc2bec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510221aaed225672500706c61af0706cb
SHA1d43f07742b7f5cffc250bb2b57fdadd36740129e
SHA256f03bb28401f1f493f01a7b8566330198efdd9b266682addf119f74948427917f
SHA512ee20608c2e757c6791e5bca7bf5866dd040b360c737a21897e5554dd77e36296a0d61d833f671bd219307621f79475234657c2c2e6be59f03ddf6e1d722dd306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5ebc4cb3502a4beb0c079238e56269b
SHA1dc44fc51e1fff5cb3e822f95ca913b7e0e1829b2
SHA256d925441985faeb7c9bb95c9aa2ff2a94d2ba774e68e173be23e33ed8db72e9fd
SHA512656e7c07a1b94fe16c6bf592a8c18713e849ab5962d0422787107a4aa737fd16270fe87ec0b628a2ef0e73e4276175ee2fa2799ac2b20222267aa647456761f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb1fbbebbf936fbc4aff49e8a86c61a3
SHA1db39dfb5fd5398a9e78feb99e6731ecf7d5765f7
SHA2560a0a7a674b92c42011bfc480d219fa503a053e59e60bed2e545d3287b4cd59e6
SHA5127e224fca091fc1926c3752050f9aedc46c55efc7fcdb9460583dd43a702dd96234e8ef562eed824d63cc266bbf71c138d5f3f3775eaaceb7565eb60d687af5db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bab654702f205111f4742c920b1a105d
SHA161e26d968710ea80e181ae1d949b12c1f0203e42
SHA25682242c9b14048c03242d199ace71e04ae35d9efd5519751b967a2af794bed989
SHA51296f9d1b3e2a816e5f9c4f8706b7176b08beb5cbb903fea5f57e0c55f45424f7a5d00089e8df93c835b522c19933d343cb228fdb62253829669f127277ae4936d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a0483819d665713d6c991288afb338b
SHA194e7ab700b5e7192d1ec30684a41813f9c557364
SHA2562526b0244535213c0b350d38a79fd1cac4604cb1b5e472d1b7388fa27526b46d
SHA512d1e630b3e42d1dd67281722759ea70c48902b5e92afb34ea1e05f31a1d92045aebc14fbf9ba172ce053a42f9db97ae27090e36c4b8df6a67472aa9b18798d29f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512305f1cb2641feb71cde2913b3089ee
SHA16cfc45e2be5efca1c0becafbe48c89fa4a018077
SHA256bf7230382273f82a3b4437540ac1f0ed1b4cb17228fbb9242193558d66ee35a2
SHA5129dc8db59c6e67860383d2a868b9302ceb6186489251cf426652c96b5d589cfe48e0ad1053243614a329eb3ad117d81309bd348d739fae91f940444dd26dd1ef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5011ca5bb19fdacd4096c61ee922b3754
SHA1a351dbf302bc4ac31301ea31362c092b30ed4d99
SHA2563aec19c3483772136ac6f8938a129478cacb80faa09deb39fed48d06358be48e
SHA5122f2c0ccf7eb2eb48232b8a5fe3f337f245c7dd7d3837b8ddc5ef0c105d3c0ab410e6d5d2351e2f225239e93000a55b7236c28ecd922bb2dbc8e0bdddc3adda18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e3866ab4671e5821a126ebb6fad45ae
SHA1827601432ff1471f1ed944da99936f19db1d7806
SHA256e3b3d5f1540370d4d7b9b6a3f9e45edd20520cd9f40759354b4db3a28ddd5e7d
SHA512d4ef674b1eb56c32dfbb77c00a841b46301ffb4ae7094f073800bcc72627f8411434d12931a57ee46f7eed7d6dbd94f57db09d8013b95edfec0230fe5aa8724a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515814652ff341e946749b2bcdbf04fb7
SHA10968fe8b19f3a5a76341284a03a862ed0b232b78
SHA256e69e3ec505d35527898c88d440a5e75727f9062f7295e300a883c027c59bd8be
SHA512b212918ceb00e357d379ad2c0f7bbf043c39814bd1eeb431ffb35e8db0ec29b7791239d2cc7df74f661bd3ed4acefb04b3d127882377427091a2d419507e30af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518f574f6687db72a0a6185e73e212470
SHA101b8c9d32b92cf4b0534e557ee59b8d7947fac92
SHA256488cc64bfed2f2cbe8f2eb3d58673fa74808ae60d2b9a570006d0e1ed2a9c419
SHA51203c66b1dd3dd3fe16bc3e3f0dccbcf277045380ce739f953db6e25a72c2418ade0955c735eeb38be7add563007b679c3524b90ae09ad45c3fb51e119a47a83fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57447570c54bb2182af65a4f19073ed9c
SHA180296e64b0bb67291a15343a26e6c6f1919ab963
SHA256348449c49d1a85a9b1ca6407cfb005b4c1a451694632fff268d88fc25983e6a1
SHA512733f52895f366b3ec8f62a74d445284533a03d0426dccfd3bceff8e52b0bbe41d928a6b2389240883f858fecc05093dfc6fe2bb8e2e837bb82da4f7610d0c1a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b912c1e704fb7828fab3c4c7c32d96ad
SHA18433281ad9469d5584a39febe43bf2d684181e83
SHA256d4a0d4be4a42329affe1a739c620ffdcbf7f6dc07ea9bf10769e8bb9b50f087a
SHA5128c91d357116776875fd9f44461f19956535e2f8e618c11c6a8acc7a1fe1b53b86ac2093d7a937f8cb55ceaa0688b8db15edf27657f23fc82d9f44a6f6b6b15e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566779b429399d9c741d9b3ba2a55fba0
SHA1fda2fd63f20c88240d742bd3fe7332d88aa66229
SHA256adcd73281c21e44ab041d6e6e185d2a5fb8aa9f2296980c3f6c6a29439603826
SHA512f4a8d8246edf3d0286c998e89fc0005fd8f759dc5f069d771f0d941754c546d7edac89fac1e480c2c313d5289e3db7f8e057f07376a333e39870c4c752dcd78a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d2be94dd6da468e2872d2ab413dc354
SHA1d3c16c57dea0ee793cb15802e5fc01f2bc7c07c1
SHA256e4d991e2ebe818208fdb60809524551688741a2961db4b7e490ef2c96fb945e4
SHA51261a288bffceb2e0d769d8556917d64a7726875a057b551f9abbd8e0525b5e1056d49c886878fff2bc22643ee5d4469268cf1dbe6cb70ae3cb10a4101d75a70e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51024aee28c59516083ac86f259492580
SHA11f0e1f57da05f04751bdb09b8e4046614ef18af4
SHA256bd6df3e25615fc09cf7789caeedf32bba6fffb6cea59c73538dc65a826579a66
SHA512f72d3dc5f80a0778a382f578ba3fef9516666afa7c176614f364b6bb7089c91e46be3b09ffb828f0d46841beb2d09461a10bbb7758683fb1fbcfb67dbf172d4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b7ebbade63e894410a3fe09c08983d
SHA1f3620e242aa19bf33932c7db6594eac6367acb58
SHA256d1c9516af5d2b12d8f43cd9b2417e7072701f0c51729f84e1d9d884983e91dfe
SHA5127163c11d01b157f58815f5adef9ca45eb43833fc8528d7a5a63c0f51768bf8d48353f89a22677cf12cb0eef27d7ccc79fa14842ff71751a5e9c2fdba1f7fbf59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f5a854d8b48423f7bc3dbabf952ede0
SHA1db08e71796fb1931fca149566e53c7eef1d79ef3
SHA2567fafd89f0cedd8297c4f16e81c805adb04a4d8b95a5c08f1ca458cbf31403a71
SHA512011308aadd72dfac05b3ec06e3481e1961904d7eccd1bc2b6fc1ac06d36bf7fa5f5458e88655f4a7d46bb979ba3b1654b4c4ea38ec4fd47935fb4a50ecd9c98f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z2D3H3V6\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b