Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
cfa967e3a72e3fcca43b74bc4f898a4f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfa967e3a72e3fcca43b74bc4f898a4f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfa967e3a72e3fcca43b74bc4f898a4f_JaffaCakes118.html
-
Size
27KB
-
MD5
cfa967e3a72e3fcca43b74bc4f898a4f
-
SHA1
3a0cd27ae6a6b29eb1fb4bca717883b4da1f28af
-
SHA256
24d5188d1c348b9dd5a968106ffb458a2f5f1882eca2b859561dca06c1ed2ec1
-
SHA512
72415198906a43fc895d19d2fe81f29a6ae3a6fe5befb766fcf6276de83628a227930fd042680fbf66af533c10ce1afdef75d5be1b988a6e2f7545cac397b265
-
SSDEEP
192:uwnNMFnbb5neeynQjxn5Q/8nQieHNn1nQOkEntIunQTbntnQ9ezjm60PljQl7MBd:JMFnYGQ/9+F4l6S9+q
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000d51189997e00aa891b95816ba4630a726737ef08219967008b0b519240df1295000000000e80000000020000200000002182fe946fad6d0b661ec807e8a592f7413805e202488e5047a40d957e49d4aa20000000c43269a2a5b690fe0782673c9491e2641e2227a24d09b61a0ba2852f5a3ba29c40000000bb3c63214d73b97b523562d899b00ae5f1777ac071cbcef87996f9f25c4e7e5c379d04909b6b5b563287f5943dd2800f1c0a3a613e338cfdc4729a21da4dbafb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6032b59b6200db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431791979" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C57EFAE1-6C55-11EF-8320-E61828AB23DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2092 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1832 iexplore.exe 1832 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2092 1832 iexplore.exe 30 PID 1832 wrote to memory of 2092 1832 iexplore.exe 30 PID 1832 wrote to memory of 2092 1832 iexplore.exe 30 PID 1832 wrote to memory of 2092 1832 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cfa967e3a72e3fcca43b74bc4f898a4f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d1cc96c6489a0d565423181cf15895a
SHA1d4e7a69bc01a58ee947d4fd381c14b64c5f01f63
SHA25664e3389598967dfc769b4973da0cf42ac1ad79012321a1c07969b81cf847d5d9
SHA5124957c49282aa9fffc3b362df8ee25dc48e059b682e1e32c746a8aef40c7441a61a53368f32a2710c5fa411ef16ac65246f4f1bd3909cb4171d1a42445d7c7c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518a9e0c0e742bda3e6ae8b419f4ab9a2
SHA12df310020188af2166af6d773145ed7777bf1b6e
SHA2564544b59191c64d32d60469ac00dd6d2fc95427f64c91052d2e12a4afa390e222
SHA5122e04dac331381d66917072d43ea50a6664311f83c70fb7bf5ab067d0c97900eb1003c662090bad20a22360f2757768322967e1ca49acc42d64ff906dbc2416d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5030f408106598fdc157d321bebbfa045
SHA1b7f09583cfa36b18d21ad82558f1bb50bb240db1
SHA2561b76a157918a56cd10f65d48970fe37ca7a02b534e9a83e6564ea27d847e5887
SHA5121b52cd563cc36cc7b4b8a0edbd8e8f0fc3246b9fbc4593733ec429708e9bb5869bdc17cdf1c46eb6d16ef1a10be45c8870a360a5e1573b48e442ff04d173e5f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5472d9953547dda0b9bcb1a483c7ed616
SHA1d90c833ffc8238529f184feeedff00866fae07ae
SHA256f4a3ffc9b10aa6ef1b2783760f52d5a7037365d8ce1195531a038f3cd4211354
SHA5128b8f40a2176f0da0eae17d887d210ebe0fab4e570f0ffa7fd26de93376eb401d2f4a613f7f21b572b21758cc931fa033ce0ca042b9e73cd354ac400804070139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be9caa227e4eb0036a24e280034e38f
SHA16c78e243a85768ac2616d22c169934c73b57effb
SHA2561f134f066a14d3ccb51a3b674994a39b7f604b0c8ce3ae4f1c65814029f17c7c
SHA5122f5dad5c9410ca19f59de9ab0d0fc3f2b998baba5060676a4f033d2ed5997568f73defdf5c077c554be1e615ca461d247dbec1d6434971d40b0e242d3359f1fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5375338984574beb30a0456e04e9e3c89
SHA1360bd1c282456c0fcd8adc55eb470dadc3807b34
SHA256910daeebaed0f6e0c92a89d30276f1434ed14f2f7f3890aa1abba693babb9b5f
SHA5121c166355a520248f41e6da15622699aae69a71f368f553a2723919f9d3be5439ea11c142c972faf70bf2ff1c18b680e02baaa13ba5c7a8a3b94a573b42991d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cbe29bd8fc30d3fed99395ffcef8165
SHA13fcaae96f1388ef3a4dd1ae511a8afc7d723f530
SHA256b69d1aa9b6d03074e6c12c6314248e6852fb69e38cb86dde43da92b057de5ee9
SHA512c675192bde4dc7fd76ebf69d086f141b76cea49857af16275a2f583f4083cedfc32e782bebf56930b72cbb943e8b997a833e4a0d30956dfbf68fedc16768883a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543e9265b1f34bf5449999c1ff5c6fb1
SHA156885f5fd10171604d1751e276f61557becad7ef
SHA256afbea33880733e172f0c60af58e0dc23b3d0656300a1c4f71b2425d9f40d8ccb
SHA5129c2221f9d3c2919d083faf159e880dad42769bfe67b96e77fd7cc55421fb9f7d1e46c0d2ab98070dcd8625b60a17e0ff63efa51fad620c775aff829db670bd05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d5c88aa95882efe7174b587a153bccd
SHA1e8697e59f1eec6a5f0efa5cbeb16601643d8c603
SHA2564b5e73d5566bf15d67ecaeb8f3049d27af609fea4a367272c4416c7d572861ea
SHA512dea4e6e1748e4a97d731ce2b90fda20191d966ec517ef50dfa20baba5b22ac648086b6b9dfe9ad2286527f10e959d5d4a92eceb3b57f8e308e95ccd5c4ac2ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b6e2330a9c78814068df1cb14dc195c
SHA15f20dcb36f5d2a091b54bc59d65204234d7fa616
SHA2568153d01bdfd8a192807c5d8c95c2442d5a01daf8b5e9e45c116e62f0529bd745
SHA512d8d0cc60950ae1e2c3668097479279aeda5e0fea646c67b0b2af1da0880e225ed9a58dda61049bc48c45b2e244b1f5068e4cdbf070d81b1c92798a0acc2a9b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f62e740f88dc25941a6caf5572f78360
SHA14d18f9b0a0771e2e9fdcf937d7f146ec0c7f172a
SHA2562814140878d117ab44a407cf9b8180fbbd680877d67082fec190388880b29ae1
SHA512d6cd5ca7a1778a11b017a55ebaed7175844c13d35c6611be8a1689578465a87607d1e743c647b4adae5f0d78a06b2977e59142b461d835f32e3bde0da4b9d790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5132824ca0509e5b4abb96221a31f5f05
SHA1fc7f39d80a0074aaf647d8ad9f805019a56a04d8
SHA25694570e1894cff6b2ccde37427889a5f2c41c8a644eb59f58c36f3c874bb9f856
SHA512df98d799085f3dfec43ee5e2c70e46f16bfd4488dfe10bc7ffac8d33c0837bf38cd25c9e5fa434bd2b677237befe6f9f057a48dddcca65b0ea453dad72e5b10e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e06a00facecc4045d6ef8bc82991bcb
SHA18a36f952515e7b5213b71135d446a366e3ec20ce
SHA256562d70df48cb9d240146831760643a27ef9de70244cfc3fea7a0a231d3e67339
SHA512710f279f326716fdac638e241a6934949dfcaeac06b551417996188e237ec833559a7b1acdb10d0b17844bbde596603ad597a10f50fbee772d9c8098f2593c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5053174c5b8492c36da28e6462f67e7c4
SHA1a245130d3635afa5d16477f048462b2266c7c74a
SHA2567d82681fe4b449b578b21695924d9f1b07bb97d331bcdeb5d431211977b7cb75
SHA51205b232d67c10ce359e6427d65bdcb186cd85ef67bc495ea30c88d4a1a9fcedddba5c66f6df95c5b9478de34292cf3ef3aaf150516f980fc1978cdc060db75054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5055fdeeb9c9e994bf7c09dcffafe3593
SHA1b795399580bdda940194814b6fa3c2dff2b0c6a0
SHA25673710989ccfe61075c722d4fd7fa803c5051877df80d7c29d1fd3e098e5032f8
SHA512a3299c5247d90054aca526701506a1fa62c9a20ed858dc8cf2283286b029c311459d3e514a89c888d431f7f8e7df2aa057dca6897e8802275d1517d29e2b0542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5148389d69c519296a5743b24fe51f23a
SHA16662d811930162bd41f8035f86ea504446e73ceb
SHA256e97af71ff85b6d3a0072ec45b83c1bc0be3a34aad5fce6ff632820aef93ad61c
SHA512062577ce5a722e641dd14453d084a97e409e57a5fb8fff91db228de5f73c00b0ba3ab02160fb1d3d0a5eb504527bd5a904dce75929aab0a80b52600211772e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1eb0daef5d90e74a2aa61e176c7175d
SHA1b9ca535881222ce7ca46c04742a4f47498bffed9
SHA256e2aad7782e7964a3133d53074c1419e5b47fe57c2a494c1350d239d671e6c7d0
SHA51204774a34398be45a93a00f41f6520695ed92fd7e11f468b93d98ffa73c52253b32d6cb492bae98b5bdf94e890db093c88afc7b4f4fe2c3f400abea528c35d69e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ad1411973a9452c705a368d60c37856
SHA14f7f7972e95d8f63645560a0abaf6631fb656e9d
SHA256044a228332f6e37452e9410d2ffd988849864f2e58a1df0f44fef2c78a7e22d9
SHA512be6856d2c7bbe053b9491a5df60a450c115c1eec115084326c76542b6c850700d0c48670832c019b62ec2850386e89b3c97a178246fd098774f888a3d687b895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b43327ee172d9d6b40dce7131828f3f8
SHA1f74784310ee4f2ba0545ba3fe87a9de0d2b80c45
SHA256ec275957813f1863fa115b06e3e667df7c8178cf040777cadac47b8dc9077d17
SHA512624b44a2501e2d40d8ba6127745917c701dca7b4074b540ed147ae2fd9a4c99d935418f67e4513632e876352a07180e2c44fce4ad683a6b308421f0bca837603
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b