Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 14:54
Static task
static1
Behavioral task
behavioral1
Sample
d68c1f473bb07ce335259c570391f5ed_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d68c1f473bb07ce335259c570391f5ed_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d68c1f473bb07ce335259c570391f5ed_JaffaCakes118.html
-
Size
36KB
-
MD5
d68c1f473bb07ce335259c570391f5ed
-
SHA1
b2310f5ef8123452647f5b6a147e11c2e6a3a014
-
SHA256
89caec0f03e1f0ab32df768034be6900d245884a46dc3a29f481c6e1b132dbbf
-
SHA512
6bfd3ffe56f7eafad274e347ef0bace13991c8a948ffd7438cf8267c6d3e68e924e9471f4f70846c8bcea31a7d230180ef2ad16e7c0a76eb4e0ba214c0eac5a5
-
SSDEEP
384:MQ/kDyF+Iuy89ZNnauV6SB7gqgEs17tPwvB7OQ:JY5F5s17t4p7X
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7638F271-6EBB-11EF-8287-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c6784cc802db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432055557" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000009ba6e10741018ec11529fe40868e5678d5e838f3b0fa61bed624ae15fb045269000000000e800000000200002000000084de68652b9fade8219e310a16b0d4658f4981ccaae2c6c79f62a5c4e745b0cd20000000dc67414a9f7d719d2e5bcd28d2d079e8f06789943b18210e58db9dd16b58be014000000079cbe6530c8bd923c5221aba0ebb39674a3f5d5e728b204cd3efbffb9498542e610ecbb77b21d97d145f2e7cf09070f6a7fe1770ea187cc1935fb48c469ac084 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 828 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 828 iexplore.exe 828 iexplore.exe 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 828 wrote to memory of 1404 828 iexplore.exe 31 PID 828 wrote to memory of 1404 828 iexplore.exe 31 PID 828 wrote to memory of 1404 828 iexplore.exe 31 PID 828 wrote to memory of 1404 828 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d68c1f473bb07ce335259c570391f5ed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:828 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acbb5748a640d87b4ce8dc123b98f620
SHA18e181bbd0e3accc91bd06e008e4b736f127a28d9
SHA2566ee18bbe1c2158755bdcf8e467a4bcc05a4373d3e65570ae9d09d38ee0cc1e2c
SHA5121ef2d3346f527743fbcce11d7715a61540c5087691ff78d8f9fb07107a7dfc5e9461d1ddd32988b0e1f3bbefa368195b89f336db435458a2cb28d0637583ef36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d50e7b068edbb3a07ce5711152d8ce55
SHA1617cb4d344685fc729fdf61f4be1bed19c87f660
SHA256d2f1fe33cb51420d3cb093b975cf872d3bf45f90e982bafa6c7f00c5edf78443
SHA5129a0d97974ea7f4fbc6dad2df4f00ed961a1ae54c4406088171fa097ffc58c169b764141ff5f7b98e23b9921e60a9d14df0a236a4b68734e3395c675c51daab2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e5303c29ba75cb2a378cf18cbaba74b
SHA13091b42b18fb240048cd29f95229128bf03d406b
SHA2566b16593c8bad10398ed655858c6baa4726bb9ccf756a89be1adaa1c899d49b14
SHA512e28da74b8274e940eec2d457fe14e1154a1671f5fd18d62a1f570e2d0e672f2ffcb80a610bb0a0e97734927654c57735718653fb39ab73e867be7fdd7a9c768f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52888033c5820ed554337767f8ea67d35
SHA1d8d383f59aeaccdea13ed4046318077d0bc0de69
SHA256908b9eb77bf34683cd96c6f44544a9dd232788f436da00ac8331913ac35fa39b
SHA512d1dc138d9af621a232526bf02cf1b08ac3204ea695b4e75b0349e0b403a1e0b62b4890e4c9c40f23eadc57227dfab093843fae0d9e6c84a9aad08d80b78ed9ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bf6af02b4d38e477c9f086b6f169c49
SHA1d01f37e174e05cf2a16f331b8b0b86d3b01dd6c2
SHA2565fb4285040d25cd47bedecfa860110b2cf8e3f67ec35e4d354033bcff503f32c
SHA512663c845be9ccbc8c4b5c5f017b3d9a9279161542214d34f1acc68d3b48992b6664383fb8ef361e1f63dd590e71acd3cc0a67f3b8282a47cd619eeef43b448f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5847ce9ee93d7ba9c779f28ed5dc86419
SHA1f77a22b5cd3da22f80279b674859963a204d2c5d
SHA2565594af66eab70ec29194bcf9bb5cbc734bd02061f41b67ed92f6014072f86561
SHA512f71d655966459ad8c07ff013dfb36b9714d4bc29d5406bc348bb34c6fe9c3db00e7180cc9c8f0604b2a36bdd29401a0d76a37d87ab807bfbc5d9e77664e1d829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9f87c11ba88e467858e8bb63dbfccae
SHA151d66271afa9f7a1e79a46fdf211f07fa470a659
SHA256b4815243fb221124c0e12d61f00b89bf9763d2893c26d8a0b203a4c1050a82f0
SHA5120de469deaa178597365023e42deb8cd82a78df6d72d463d41a560e7a513cc1f1e245d082bf7ca7989cfd1b0436072ff7669ec7eea0efe017e659f7b51179cf7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e24299d444d2f0e3d8d59fd8b68e0276
SHA1b68c1c7e9cfa0f155ae9cb08342d0fea291c7628
SHA256178b262aefffc091483bfda64f9412ef9c89c02464510e429943d287f01af2cd
SHA5127e2efab3fb442780cfbf37ff1df1489d0dd255e44adc91efc9683c5c77cab31b3b6a81c691bc342acff11859e32af9698ab9288692745b4f0ce26e80b6953351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d026d5c5f14cdbf4e1974e7e237c6195
SHA1e418428165105e0a4b753a8f874b18143aeb2e2e
SHA2560712dbdfd9f1396657208eb4c6a9eb67099ce25e45c29b643fcc519d4243fd3d
SHA5128aac54a724e6eb5313638fd35ad993a768c4562ae5285af5a7ce861d53cbbb9a8826b22b11da468c478b877218bcf9cbeb2ed341c46193505808c0fedeb8e70e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53232703e908bcb6d821dbc3a0e8ae5e4
SHA15bc120a0b005bc0065a0dd27064a5932c06e905e
SHA2564c9411c6b8289a7a4feb77e28d9f2a24a8d4a329f553c0acd10c75c212d64e88
SHA512b831b6f9d4f6605b7cf75b10813eb4e5e423fc5fcb7b5cc4965639a219e4447a2ea28c8f0b965b9841a6c86351bdfb321882799d52b747e8e4833792e39b4e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee023acf735435d53f61186646f60590
SHA1ffcf4d9df0c5ebeb5c691bfe738931c274fbf462
SHA256bb68127d2a3ac3bc68a3f8886f7e90414a0611d5ff1adc1171b3550a4e42961a
SHA5129dddd901602cb744989411ff9e08bbbfe6fa01998804b7e0970edfefbf6baa56c660d3528f336c96f74e35f04849d9eaabcda8533e9a6ed2ee46d68826999ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591b9fefdb2f7e6e3be42e59924606213
SHA19df850ac174571f2dcf28212482e236dfa5cfc2a
SHA2566b902f16d829ac92f706f4f0a838cd0792bef413806c340c7a11b2757d768bb2
SHA51216cc8768011524d86b55ceed4834c6f762cec127d7a0c8ad5626e58633b8af6e6369fff511fed21d0b8a0a701cc8ca47941c381381af4e5d17d44fe9b02096cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d014e89998734e362def332d5f9a718d
SHA1124083c2102578acc0980084dd519e4a43c3eecf
SHA2562f9c1dc0a43d0cc57fb7c8b2500134e15b7619b1668eecc7ddfda52ada22c31d
SHA512a66a867e7a23f7c9e4e7f9dc7ab41db7123668bc840987b014acd5dc4c762279d84427619650661b0f04895b845ab290919f70bfc4dfe219cdac46407cb993bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5580dc4b9a9ee55d17c93a9e1a3712045
SHA15a8c54fe6702948131e4d49feebcfb8def28b006
SHA256bfc651eef02c6fff9f86d499602db8405012f96f5429c959b2875e6f0e6d2417
SHA512e6c9839e8dd89c24972a7b999cc7f4c4a85c7d9ae37f1875754ffbe57687ea7e5f992f9b207e061f87f8de755ec079cd5c139d868e6d276c32e6ff30c8a04549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c5f043e01a8f6ae38094fa507f84221
SHA19cd5e42a5b20d542491bd564f0223ec350c1d150
SHA25695a871124738d62ed2db90157a76eee84cd213f9e1d63fe9e44e200629c5302d
SHA51277a4c38442bb4b865b947c6fe9631519926f02ffe6efb5faeff0fa524827befcb253b657e54e33398abc5060549043c3077769dcb42dc8745c2a93cfc8d12947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abfe06b314f946c528a401f746438a04
SHA14b6ee1029f32b3115807c52ad5753f4288731757
SHA2568e28cdca4f0f3be175e09938b0b76212dcb0a8f7e5d1371f75e38179f2636cff
SHA512c0ff0f0314dca328f20561e5b8a2ac30922da9c637fe50d7b0b013e3d53ca68e7cc66f57622ee89b4a3848a4e16b4671009927751f1ead33357888ad5d4de65f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2d30a815ada4b0be57d090a025bbc4e
SHA1eb14c755ba5d6127c9517006e723b9b060599f3e
SHA2564f77c1121c4ffc8f8f08be048343a63fa43ff481ed3d10fe5d27ebd84cdeac2c
SHA5127db3db4ba0aa3dde6c97be0d5060cabe4f81e12bb0b995881d1586b369e0281d604de6d463585a0b804d0a83183224c1659e80dfdd159fb1c82dfef156f44c1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cda37bbb1df119ff386acafab383fade
SHA179e09cc3b63605ec634c457e25a6f1739cb41bad
SHA256e861b850f0ccec5b29e1a7ac05ae78ddda1dea84b4a70b197defe4e02079f418
SHA5122ae9949f6829d824780c09f43c4f79cbd365e3565be7edba73c79cf6e0cd7396a247641ac2ad3506c3e6017c13c4af509387f6c8b55e2a26cbf4ab63c2cf2d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c010e636f0588da716d3ca7b189b3ccb
SHA14a6fe6dff1a895c25db334c2d88e28652b40c7fe
SHA2563059c75a882b005f2938fae8b5d4dbe4e9332f727a8f8788411cdb4905fc3692
SHA51206a4f9031bc6a8a7efc59c716f1f42eb02e3ad8d7299de9d5b0551dd706fef6df2fa5c698a4e7a9ff6f208c055baf107c4cdcefd0bc0b78d2c345846c3a3aa54
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b