Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
da6bbd7ad247b1bda12026b83a2eb2e6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da6bbd7ad247b1bda12026b83a2eb2e6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da6bbd7ad247b1bda12026b83a2eb2e6_JaffaCakes118.html
-
Size
6KB
-
MD5
da6bbd7ad247b1bda12026b83a2eb2e6
-
SHA1
661c86c457ca00f572ae15ad5cf97b1f63593008
-
SHA256
c64e0e0a46f122b6a5bb3f4c50c6c444fea2bfa98ce570d5bea0eceaeec84171
-
SHA512
c1e1449ca6e2474275e43b03b687e403ea0d053e5a4de48b25d3fe2652068baa8df3eca23a2c390f7701488a1e93ea3576e7eef366df469ce5509406da5489bf
-
SSDEEP
96:uzVs+ux7qMLLY1k9o84d12ef7CSTUBecEZ7ru7f:csz7qMAYS/Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20c8289e4c04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C5083A21-703F-11EF-80CF-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000850b59ff769aac83b7851ef4cce7bddad781a438e56bf234f933e9383b236f4c000000000e8000000002000020000000c8bacb8bc738bb29e2558ab90d55d36167f0ccbe101e94614a86e9ffb134f50b90000000a38e32453041d51a76be17addf8c9768a84445287db7ca08cae46ff0a1e01f9852a7ce574c7939a01ba3090d2da9c63aa1d8bdb6761fa69c825223883e1dea21ed028f4ceb3c655f00182e8aa4fd5e8e67694a6f4b38334daaf1c8f787d51b13c4186ed900ea88b82385ddbc2e2c6b50e5390846aa0ee244e9ccb7aa8de0bacb77b2de99c71decc1dae220e520b48bef400000007dd236fcb393ee314b1df8dd282dc0fe430d4dc37edca2aa9ec3279bf5b1bd0bd04c01febab60ec4e890047a851b2e1df2620e8937b93f8cb0822f013ce341bd iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000368f7368575c832ea517ba7c2e977cea210cb598e9d6eb9a55cc1b3be9f9548a000000000e80000000020000200000006f5106d3800cafde6763a9e04af288b2809597edf89306f19dbe860ea260b2a72000000044672bedb8b78ea2735163f9553c599196ca586571beabb947393314db8d6d9b400000008d83deacf86399751674d797d64376aee26e8d66762c661343908f71dd00a75b398d74efb31c1e3fc780fb3e31de48c96f813b3c1e23a503c1ff41e7fdb00930 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432222341" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2832 iexplore.exe 2832 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2832 wrote to memory of 3020 2832 iexplore.exe 31 PID 2832 wrote to memory of 3020 2832 iexplore.exe 31 PID 2832 wrote to memory of 3020 2832 iexplore.exe 31 PID 2832 wrote to memory of 3020 2832 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da6bbd7ad247b1bda12026b83a2eb2e6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2832 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c04a8ec5043567af4e3dd1c1a44633c
SHA16c6ddcd7bd9d3315c6f376249bdffe4f2a9bb49b
SHA25679dddba5a9ad30caca5d065bae9741bb115c812c93701f425c71c2e1cc0e6277
SHA512f3013db5760db4b0cdd4186884a9cafe7b3abb45201e0d616e4f18d994b4d18d93be90220b84dcc93e1edb6bb3c74d82ca7f35e19656975dd8b3e0012564b6a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517db054b2cab14e21adb0a339fc0308a
SHA1d57eae0676cafded8afd5380c5f6ee5fadc98499
SHA256c54ff33ff4ebc98b3a9707ce4b71a966a1187a08783e0a77aa2c846155088a66
SHA51288bdf674bdec3d39e2b87138f68d35b87458845b1b48ab9f30b2f159c78d1c4a43d5297d85f5d884c368869ea1581ddc2874f7dc9ccb3f7fc4abeb2dda127d4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56aef429bd672bc521e569d35172aea77
SHA1b6d78a7b252a9c71ebb8e0a2f611c52e8a5d0654
SHA25636448904d7bb7843baef63020558a3a86a382b2247005e7a935424fcd4143999
SHA512cbbe4561a50667d199c54ae191d830403ed36b74a78bba258aaa69a82cc1311583a46307f472abcdabcf28f1f5a9364c00caa5f4f2bfeeda49b588d785732090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5380137d89afe74e4d7b7729250f7b9
SHA12dcd3c45db9dc7a2e07b7a7d041f36521ac3244c
SHA256ee0136d0d3e74f9cf830b25cf67a823ccf772a6a263333516d491ce5cc7e80b6
SHA5123ca137a0b89967478afd4e30ccd45ea551b22ef6d1956ae03b3e748b86207efc0a548a328b4c461e6be031fdc661f257919f7d30be8f7ab7e309f76095bc270a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d473945c6c8ba0a9785c775f6b29b4d3
SHA15d514248e81ab34991cbc7daf5389ba8e23fa594
SHA25653cc1bb061d21b1ef1df30da6d26acd94f561154efb9150adbae4716429206d5
SHA512a3b60dd4caca43aed7063ba2b353f9a2c5784d7f5578afc8effb49710f1bb78e29be9ab46577d6ea66ac46cb55a27c7a3b3bafce678082ab1398e74a4c156f1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5fe0c4bb60a93f977c9182078462940
SHA1a59f22765958e43310feb29762da3ebaa01a54b4
SHA2568baf5fa4ac735aa0272d817cbb8615bf9fd84efb2aa3bd52d6e986c5c7bff977
SHA512fc2aed1a2ac6305d600f81b58748ff9014c595f2aa77aa97fa0c11c644e4591363939ea0de561108735f48fdd980df52154256a0eb442446f36bf1c6d0a483a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d76b085db0a7590b29eeec27095e7377
SHA1bab6a9882ca3f290f7ae261db4485f95777646a4
SHA256b7d4fce8c3f9724012aa1100011bc2df84cbe4d27ded28f7fc9e19079c659b86
SHA51234060ee13666464b4b1eed685d83b7e9765e553872647350603959d2bd4a2b9128f6f5771bebf958d667f2a43745c3aa345b3a341ba53950f6e73dcfa743bc87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56202ba69e00426a4d30babaa4b7af231
SHA1196974f886734c1c2038b810930e2d1c0fa019c4
SHA256db3d15d23090268f4308dc3e0ee929d5e0126313b7cd8000a32ddf261f49d3e3
SHA5122fb82ebd7129b6b84092cc69ad22f1edc69934fbad9774b8e196d1c8493e4d87f8185609fb6f5b94651e43c871d0c1632a19643f670abc9feb00397edbf74737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5530a1a0609ebf1cb6f4b34b246c9844d
SHA1859f6773179f682f0d0590939884749f7c01fe82
SHA256827c5c5bb513c318d5160e0835ddd41564d429e9c5bb735e2ad20dac17c8eb47
SHA5124454a3daf3f18cffd6fba41127882e4c8661c4668695ed7e322edd20009ed18ecaaf8e856127a88303a97d739493883df70e70f1d6f001fddb2a01395209d33e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7e52730d7d2d943a57102d04a2340cd
SHA1143c59b65be88f86c3f17d0a15d65e947fa7e6d9
SHA256593164bbf63b3b3ad0a24c0517bfbc284c943fb48708428c8afa57cb7ac1a1d7
SHA512671cdd2a296e67d9d0e8e02846d421e55cedf0ac4ee808910a129640af2cc00401b64bdccb7ea7e8b626df775661a14bdf035a27bad87a72635a82635fbab0ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2d2b2c61d5221e963a31ca9849a9152
SHA15d0fdcc7239037880231b4420c2af63849bc407c
SHA256bca765c9557d9d4c15d89f64f81e758d26f4f9b83815ccac96abc9e24f0369e8
SHA51292fd030d98fc3cbead7e14d11eaa48ed37869e0356955d3d0dcffd48a64effe33998d6a827f7111f0c8fcee28b80c2780255b6234a7eeb46fae0df09eccd9ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5790f255d85cf4e2b8d4d5794a882503f
SHA13326cfe14c711909b75d60b554f5d860c80b02a7
SHA2563444b3ab201c3b391c693b3adfa25cb943306c888f67e44bef0a267a81b0611d
SHA512992f787244293f1dda6d0d1ee233bb27605da9f6956164556e6efad2ab76451a79f8b3b90b7cc1a8ae3c44a675253dab9c4bf1e413d45691fa7307175c3c9148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd3d341182337ec6cc797e35ed1e929c
SHA1553f80007d5d73d111dda6b9145ed2d23fb0034c
SHA256ae73703591fe804d07f67b4772e17d61378e8ad5aa2bcf9dfab573a778fb4acd
SHA5120aeeaa0a1c3a9b0f5f58d67a5651e2febd29d60b7048ea947dcf789398071eb52fb26754ebd3bf6417fe41cdcae7fb9c0ab34a9d48779032c0096506cd55c8e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fddb1c523d2032688e107168c50ea254
SHA1ec50cc0455873e07609bc10b37b56557e9598c3b
SHA256546e7b9cde895ec9cd78e3bf4ca37f53beb7f810ece0977da566a2930d411ab7
SHA512115c0b5adb1e9d78518a4b2c0f2121f263f607e24ede650aae4f04b7e608799d0b968706eed93a048f0f1d3e724466c248e7ff60f12be9fb9c53bf8d024eabe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57be5c9a694770e162edbe26c3bf72982
SHA13244043f3efa6505729c68f64078a2bf62450799
SHA256823b172ecf5a0983fc4f16ea6a99a4c3f1596f20e6def0f4f9b059701657889f
SHA5123a49b2b4681fad91898a4ec05a3ca3a31876f504d7dab088bfba5a04b5bd223ab4c256000b672ab1075edda1b9cf8e1e95a7a9f078b289c02d0935d19b81ae45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5687bbfb2f100342d1266ae1b903db46b
SHA1d82dc88f2cd559e9d6c8eb19317df3f64daebd3a
SHA25657cf7070d00f05a26446906a5ca6eecaa16c12e00e9ef11c23c0ce2bbd4f232f
SHA512e1f19efc62860ad7a8b02d2f7d9d762004178f5bb05e43426a5bb214ff1e7c835ca6195b636580efd7e562efca72dd7acc6d9b9391f676f88b49237147f9f8b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e39559a2cddd345c37310ecbaef9e3
SHA17af3c7d6b342e2d2579164776cec2d4179858802
SHA2567abdf5c61f6705a05bc5707e6fa88e8a845c16695c9a0d6aa71ad739643a8032
SHA512a42300fa53420391f8a58599c4b16d77ee3325563d2a8101e80d38b9b3e28da055fb7f49ad7b98c5d7f41ae338eca930475f5aa12393a4f4338b938994206270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b42a19cee1bdb8852504b9c4467a83ae
SHA10581536886045ed47fb3e19ed5941bf44cb98c4a
SHA2568460c9f3fa6c36e75e3b9f89817e9d1605c2f84c3f985b086007409cd2368652
SHA5129506b2dd3bf8189da9da2c8f2e5d049e8704c23c4d6d732ebd31dde58e82e6b2bb7693eb428e4283c5cb400424f217d5e13f1a4666d5eb05891401858da2b7f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eb89ba0d183473eb381121d6a8ea757
SHA1be0bae3a541fe5dfd31b36cfa9f6a700f1f9c1c7
SHA256b31d254d0f30870bc9ceaf0732feeac3df5cccc541267c998a697904505f52d7
SHA512188f50443ac325ef14b8b520bb4ef60c1c539d2cdbaf581e82bd8d1369d90a1d13befbc5c04845ebf3e19e05d3562389eac228a1582c8fc877dc7fd6818d8835
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b