Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
bdb3b9d6971b9b3a09ccba75c0b5cd60_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bdb3b9d6971b9b3a09ccba75c0b5cd60_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bdb3b9d6971b9b3a09ccba75c0b5cd60_JaffaCakes118.html
-
Size
27KB
-
MD5
bdb3b9d6971b9b3a09ccba75c0b5cd60
-
SHA1
89971327c42f68dd94d86a9034fb4401c4ed7f1e
-
SHA256
a86da4e3d6778349b160720d777fbb878f2ffef21ea79fc7f58a0df870007b0c
-
SHA512
385a76ca3e320df94e890ceba47f4d22309f5077119fd74e69a2136626f1bf1a866eb48d5170f6c9bdfc4cf244dd5e68dbc2622190ae5594c314632489d61412
-
SSDEEP
384:nCZlKNR+kzLvPyZllFRUsMAnI6XqEF425+hLe0wwR4mT34AkhoTx4zuxcNoMPSoy:CZOISNHTKUSTB5KdX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71D6D171-61B4-11EF-845E-D61F2295B977} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430623178" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ca394cc1f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000f808083109ff8da4d617f8ede27071cb066e298abfac578871a6bf3543f30587000000000e80000000020000200000001d823d4c2364550358c7657b020e749be1964f1eeba3d85c970d87777e0c382e200000001ef0c5839445fe669f7e44503131dacd39b76442e8e11f6796854b2008e27eb640000000e5eae15b0ab5d83ffc92e9e5a9b8faf31d2ea4d82316e93bfbee4be23dd28ef533f700123999a98b35520a0d5db858e32edf259c24fbfebc98a500fdc9787186 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2788 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2788 iexplore.exe 2788 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2920 2788 iexplore.exe 31 PID 2788 wrote to memory of 2920 2788 iexplore.exe 31 PID 2788 wrote to memory of 2920 2788 iexplore.exe 31 PID 2788 wrote to memory of 2920 2788 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bdb3b9d6971b9b3a09ccba75c0b5cd60_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a10f656cbbfbc075de3c33e9579db33
SHA178c9e2d8d433e827532ec3f5da0dc2b7cf565df7
SHA256966f39f2989eca2866a1f45ea83647fb8f5b362a120cabb9ea526970689f60b9
SHA5121e2556e8d230e1968a62ea6cba432b18ad3e1ed0b5155898a823366e2987ae0372fa36732e8a11f8e3447ce5dd1e35516eeec424c2fd3304607263124bf38271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de23d065835601e95886961081752a9e
SHA18f298d7fb41e004f9ac00af01127ec1e01a24aa5
SHA25657277251b5723d96ec9c0ab7c3848be84b957615667a7d2b79023bb0d96e5c35
SHA5129ab34bf4333ec29fd7e517143df9706a37be84533f38db89c4adbbe2c71fab4a8403a18203938239e1a75b720c81359c56b19b46d0a2c9e7785d1c89036b064b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b8aa7f56468822626073b2e67b61301
SHA156ecf215f9a414db25f21adf0cfb12d70d220ae7
SHA256588431df56b4ad6f43fb1eee1b48e3201840a22c15f47bf144cbb70f0dcda4d8
SHA512fd8e3985ce491dda12c19d3a6476e5e51758ee9f64dce4eb4267bc83c1cdde3388a6d7a1fe640071e8b2ced6c6e1b7113ebb6f318ae50278089836fce3a638f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d1c134ab143108eb0a9686426b9c5bc
SHA117aaaafebc9a014374bbcc91918950e5807e0185
SHA256f1f56a09b26a6dacfd60ee213ff75b4884ea7fa5d2d9f1ab889243d8499b7688
SHA5125cfa7f5ef28f187f40f0b571a7de5ed36290b3563982ff53dc382c9589a4634d7d228db3c5a5e761b2d20f4f784006d73f83c31ca654fb694169ef42f053711f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567b86502614f5a82b82aa071a4d64a32
SHA15d654ae6d293105a3bda467eb4697d2140c47dcd
SHA256526ce21b074c0ec56b068c2e399436d4d1245e734b9a722d5de945023456a4ff
SHA5128166c274175a8a3dd20da3f512887d970ccc16c958c779aa9ba9db3343da589dad9603e5101eb1f1b188601cf753930750a701f488181784c39a0be6995aab1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c57ad978a3127ff9982417c16ffd912c
SHA10a880d4172a680fd59872a4859234bff2fdb32ee
SHA256a757cd10958964c8d41b290a625e7835e817f1d96f8c43e1faeda6d0ac05c213
SHA5125fda3a456034387d4db7a056525902847fff7bca8c4a3d1a7db3597bc5827200bae084f939c206ab1eec053525ad1149423bac5204c83a70e1d7af5a5fc8489a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f8be9b1348705c429988e00876710e9
SHA16f11030dbde6ed66fdb1ce474bb2825119277366
SHA2560e18a6e5a07ede7da527ddb805e4eb0711204fe48e5c8acc4966977daadb6421
SHA51266efc3053f0337b680bc7fb529edf1dc6e2448e815ec7ec1835e955f4c836b8c8f4882fe23b5da43fbd5d1d77e87e1fa59416728924b2db970c77f955c3b4aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5017b2d49fc93b2ca98809ce9cbd2e6b7
SHA17dd5d883c6812845a3a513cd39190fd84a617c4e
SHA256a03303a5f6445703f44fa4502f88f45404ad75baf8b0bc00ddcf3d6e84bc05d5
SHA51289e824200043fd52f2c74df85fb7960f4763b7c0d166fed6261103dbc0129fab7467c60232980545a56f96d2ddfc0c124255224e7af9eacc3b14ec280dce5d46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56465e4c3ad5d0f8d55f245567b337d87
SHA1c974e4a486476da6df2a809829d29a3d7f46e1db
SHA256b21b86cd03f7fb94b8f5b9fc3bd97b980649c19af4e76a9161236fc421aeda56
SHA512aa0602a1661b8d29c1db5854dcb4cf38a3a2445b4f8db2657a6235e32d1a9ec701f98aaeaf181de04de6359524525ca89a231434f987e7b0866632fba638d558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593633ee7b573ce3084716392238135a1
SHA136bfbc6986c85c1c38e171e0e35f436bfd96fff8
SHA2569df47fecfd83bd1afdc099553fc2a95cddc78e801caed9817de403c98b85e298
SHA512908775367696255d31f4a96f0888040e117e8273f5416043883ea7a7007c56fa583e46876d69ab3f5be3cc0d9671525f849ce6b62fc6d5e55cbe8d8cfe43b9ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee290a8185e29edf47fc26107d49e7c
SHA1272debabb5fde90b88482fe989975f089fa77fa6
SHA256bd36356288bc380f018a8835048b813f365bc71af76583ca6c72228b6c51c05d
SHA512e2d42550b1b3bdcc4a0cbe0cc910812d28750571b1588f53ce06e071c51db2061e7e3857ac7a76252e4d07d4135a80c558062eab29d7b593ef7fd3848ef36d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50438dc7fb874db193d746100709d8daa
SHA1c87dad13cc86a48d011792c3556779b5234481de
SHA25663c118479afd168d2501008f9c8302889ae267ced88d847285a24e9f04e39875
SHA5120e7345e89d09dbd194de2e4f1973427e260e8f86f6b0dc0d9e8aed8ac19bc993f5d63adf0492809a4fd1b551e953cc60d48034e4e2defe391a1da7bb35a4f3fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bf6110e48576a4f584fb56bdaf4e6ab
SHA132226dc6bbd3b1adf6029515da61265ee596fa73
SHA256742b7aab7f5e2f44d092a41f6e3575084ea88ebd41be70a57f32fd86d66d6f5d
SHA5121d8222b2ea84b0c3bffa8373db84b90918479335675b0ce41b389765c7e7fd21046540bd324a98c11201b6b1449ce00a3d89f4999a9e58134c2bd690570dad9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cd34e11e08d33d9e1d11e32604e7eda
SHA1c5dfc70f562956531a912b50984eba743f4d2343
SHA256a0de83493fcb50b3999fd236815f7d861b0ee807fabcf8766d16810a94fc71a5
SHA5125f1da70cb1c0b81e4c9c31a1e7b8958cd27fa69341d9d286821a5e376a24c06fb1aa80f6b910659f43bc38bb555049ce27d38df5c913295c17d944598e838be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507588cead9b1ffd7cdfe7c2ac0138e5c
SHA1ad5dd01fead8097adb8b84fd08d3f2fff35cf99f
SHA25604184128c56f04bd52dc93d0b0c53da1d5ad4e77578e859bae3ee86b4afedf7f
SHA51294fda321785118a1476304bbdc7efded2b5dc268f00c066ddd486a0fc8a7d27428d118a651a947e8e9efd9ce042b9df39e12153a8fd96ab6983751509c415780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d25f29aa25b767a2b6205c4bb5a50e3
SHA1b8a1a3923f4da9b385b3b46bc8f60aa69a3cbc54
SHA256ccb8c02dd16d5b76bdb2fac864b4db9c6ec18caa6b781028c606ba5d95bce275
SHA5126370b7a615cde76e0077eafbd994437878fe348d4929936e1d4a032785850a2d994ace2605310a0877d2c7d5868a6907cc871a4b88452385c1bd8b359d4a5bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca2389fe6b107985506fd4155278a3a0
SHA18dced6c9f9eb01eb29ac46dad2e4497fcaeb4f40
SHA25617e1e7db772061d7e44928c43c42288f099e62ed3f80bf687195b3c9150c80b4
SHA512026dc9242e8372cf575b8eb9c980e9ca391e9c4df228c1a90026691874788cec190d7e013ee54adfedead9576b6c7750a2cb7356beaab9527f98321ee9075bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a00d6332822b1364d77dc3ac0e4d16f
SHA1449fea5186d9c9a387debdbb59a881bccb76e715
SHA256a9bddd0a7e182a8c53c3b608212ce1fab80b34ecf39c52326662f818112417fb
SHA51224d4a45aec7cfdc2334ca1044c24e79caeedfacabeb075154bf8f47d962c0c1950544063ea5e8fcc8e215f774079f557731b84efa18dd2d8240f0af975028963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feca5fbeec862eccc3ff50d0af6f59be
SHA1889c397ff97ee0b139cbc6e1457bdb3a4854b10a
SHA256f9e298a1f178ade9f4380c2dc0beabd524c31d243a9840c9c7151870cd2706a4
SHA51213180d4078964eab516fc0f0f4428db500bc802610f499e708abbd390613e3ca145e16291e9099dc36ecee39268b27eeefa60e716f1181ce667e553e489511fe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b