Analysis
-
max time kernel
144s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
dca28b823b913d6d9fdb05056a3b9ea7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dca28b823b913d6d9fdb05056a3b9ea7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dca28b823b913d6d9fdb05056a3b9ea7_JaffaCakes118.html
-
Size
133KB
-
MD5
dca28b823b913d6d9fdb05056a3b9ea7
-
SHA1
998720a18aa73b3e7473cb1b61e2b3c8e6e03b24
-
SHA256
80f42d51f3e1fcfcb90a168b5ade5f0710dc0ab9f8b81aa22ae2af78185f462e
-
SHA512
7471817f627531ff7f122043a9e5d0ed17ab5843b34c63f8ed4ff098683e9b7f1e289dc07dfc23209edcf72e924f3857d944acafa0442002f50ff80c963bd545
-
SSDEEP
3072:KSOh/SSodbnckaYJNQMcZf+frCqIA3+iUCroS72TJrNDBdpF2knb:mh/SSokZOoy2Tf9
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 21 sites.google.com 27 sites.google.com 30 sites.google.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000b27fc3343b49ed42d2a498e6e0c39e67f946d0636d64e73d11b0c71f26e03cae000000000e8000000002000020000000a13c67b7b070100ecdd593d6b26d55a121f1ff7e882f6c970ca3f3afbf07137220000000067a2c1ec98147f5353b5e463081413c8b10dd650dc3d6a976c84716b0dfdf71400000003611d733101a99cd13d9d3e0c53f57ab74d85621457d5c935daf61de76c75ddc5d16ceaada79cd550477e6223148acaaf6d4c86c148ca645800ad43e4cbf4c50 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{302EFB41-7126-11EF-8C6C-D686196AC2C0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432321297" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c7ea203305db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2136 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2960 iexplore.exe 2960 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2136 2960 iexplore.exe 30 PID 2960 wrote to memory of 2136 2960 iexplore.exe 30 PID 2960 wrote to memory of 2136 2960 iexplore.exe 30 PID 2960 wrote to memory of 2136 2960 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dca28b823b913d6d9fdb05056a3b9ea7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5e3495895d56639965891ab6214c9bd
SHA1957b96a892b407abc09e8a82f3e9976da6b55b27
SHA2563f2af71317452bd6ba09a0577778b562a1291549c9edec88605fca74363738cd
SHA512d3bbcf5574e6181b63ebd72ba81ab9bdb1967b41207b906201d06e7ff0cddf2b9b7ae0941c4760d60081a90bbedebc3bf6f8b56ff8323c2a2e3e9b5ef5080d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f40622cfdb76f64815edbee54edafb0
SHA17f9459cbd8e7bef5f8b329dcfde2ffbd99675ebd
SHA25636a50261d5c01b05b3bc91d785bd3aa125581c9ed0f06aad354b4dbcaa3ab3e7
SHA51242d96597df9d773702ba14466abf7d626cda5fe007190c6dd4fc141d9497c2bd204e02da82e1f64cab78bfdde3c8d72a4c170050ae36766f99eb272f674c4261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0760424ae472e90d5d11fd886bff24c
SHA15be1f290981acb8e7ce444dd72dcbe8afd8b5dde
SHA256259b411b04253c88e0882c741ec0ae568a7da76df80fc33733ddb8cba2040d1f
SHA5129f588c37387376fc1f496a333f19de21d276d928608e56392f91bf384d5b73bdc0fb993514ab1112ad734baa3e83b383ae51891caf54be4028de237d7022733c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5685e3602768ed6f7207bab187f96bfa4
SHA154185d3afff66c8ef205bf516f4e83a8b384e767
SHA256d7bb6ab5f849c25b99e5da7a737e38bea27a9421f4c080ee7a2963b57ef3f902
SHA512a86d5272885c3137fe1e5671285463cc6e639a21299821db4f9e0563bed7987b2cfe11258422076240e3f21f11f26da0564f8cc771f269b5d2bb90197c3daa76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59373130edbae12a766120a2867d8b9b3
SHA14f4ecad65ee9d399d205a8bfdb149f918529ca5d
SHA256a0e90d05920eb752471e17166cc079a8a05980d769376e8feaabfd7c0f47c639
SHA51249507388652e17368f14f1cf45615c43b80a5b44ad1a6e2d27386d779f01be8b71ec194b26b1f807ff3c13efed7276c8b5a1e606ff2972134dc58dad3d396483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b2f0434f2e52fec8aceed0705f3c99c
SHA1f38ba7908105c58e5aeb7097158c1013f87302dd
SHA2562175586d255ccc3188665405c82f0beaf8b83621f6a21328fc1d856c9aca1f5b
SHA512303070510faf274a00b0796f46089a1669d323a4a6148ef80773b03e4dfe62a04db6d34d157c3cdbba2f1a8957b8c93ee5071bfdb4151e09c0112211ba490d6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53783d9b32ff73c864a546d588efc164e
SHA1953f76d6188092bd5e3f811b9aab641967c04112
SHA2564ca7f0c12a45c30e42fe3e07b33f225fb2dff30c350cb92c5c9a18111f1e09ff
SHA512bedaf51c1bbfa4c1224d5ced29e76240bcf5a6819dd731cc3b23f8f2b4d71c90b0f9abee4a7c45a2e61fe9f24356a280f7cc665c0126d829dbe7be4966f97887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510c9f5eceea2586a0f374310bceccdc6
SHA10afd0e718dd04872a95214db8798e702627dfedc
SHA2569a304bc8ec6d451dc6222c7981f9a44c7e05c293e87edc09f9f30a8c480e20e8
SHA5128070b9b23590e1653cacd3a56bc79bb78ced8ec0a60c8c17f95b752f85aa705fba1890b06d79a22f2a8d842c27fe31fc3e7c49d28f5a94c840d8068325ebd0a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b88b497cd5254926f79c118a6b9bc4f7
SHA1ed026d62053d4e9ff64dcfdd4eaca1f83096675c
SHA2569f49823ff9b64a065c1b2a4a2bf5dd6b65725eaf7069ceacca5c0df40cb4a2b1
SHA512f15bd12e735db1c750fc0ca58bf65a4cb48dbcc8d14e2ee4b2f4d6db1b8a6567a7935546aece6cea7e747d952a41378f3a12316d078e1c351945fc50341de49e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aeefb8b2f9a132a5564ce3bc6af5bdd
SHA17e721323b4eaa81f0b531a177e8a3d213abe1ff4
SHA256ee10b050f561c605c5d6026d5d35be910a84e2016dbf5fc633d46485a041969a
SHA512738560d75d76ae459aef0c8703ab686bea4923cc03812ff74c36c7038868b35799825c1f9b758d4a66c2ea150856c8289157a40ec84060beb2bca9fd6848a7b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b05e1dcf1bd30274f4df5750b48e5945
SHA18442cd0c8eeb47ba410530079049b1a5a545d09c
SHA25699c9ae8cc87d3d2dfa11ea092946b0de6df4e44903192dd686c3dfa7ec4418a2
SHA512bd7d1df1d26771e8b05930d81b24ee267253ea8ef6425a463acff1e91a9018e2f1a3291a505e36b90c95d616969f95c052795485d560a92cbd10aa0ccb6c5388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50980acf8c72d1b3420712c432244347a
SHA119037471ceb3845facea563c31f929098a9ec31d
SHA256673097d592137e79dc1ca3b270039b38cec8ad17df7931627eb7e663cc1edbe2
SHA512bdcf7da8e844b23471f5b95f950682538577b9da9cf669a10d4ea55a541af560da087f2a2828038d61484422cdf7be53f265d5a5d9e32978cbd442f25ea043b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6bd264505ff9ece5c2aede5c31b3d21
SHA19343ee6ba2df982efb2fa047c5a452f4cb038ad3
SHA25635570b9a9457305ff57c7a2dd71fd3fb9779c4e5618167a2b212b60160d81c95
SHA512054e12a860b02b931837f982ec05f260241d591fe5808c8eee9d1acfb17b2b1433b843a316121cdbd4c20491ec87958d66e0d852ca4604b1d8909a48336e32cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554c9eb54308cc3133ea432acd5627b38
SHA169387ec36a04021ea4259461c233feb13bc55e6c
SHA2565dbb208017848e8fa374c1347c378e51cb6a9493b04a270dfca5be1c4c395794
SHA5120e9277be66a070ac5300b1bf7f3433b69f43b5787705dc73d29daf3ef31f9c63dfb5a4efc6c8a075e99e53ac70a21f3f46bd92ab1a55d12f3438d20bd8da2587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b976781a3126a0b0fcfeb34961b190d2
SHA14d7976a921cb0e6c7221dab282424874cf8b62c0
SHA2567f61e8aac40cf411354dc45da2cc3d23c2671d4d894667df23a5adbefaa9925f
SHA5127cd7018df7799f08a9010699ffbb6f9feada628175c720338f69a7957fa744bbf6c54a1cd39736ad4a2f9f0b3235477eaed495efff569d8135bbe3e5dc7fe53d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523caa9d9baaebbfbd848dc7b7ca6b643
SHA1e3877ddd3ace5b75cfb3a00ae71bf34941b0c4d6
SHA25625958bac7388c1e523ed5b7947d0915804f40fece5a0f99aee22726ec88e7ed6
SHA5124336dc5bba61dc0aace67c5e6c9a38ebc2581769ed7646d6a23eea42c7279ecf682480cb9851aecc8174da12763afe13b63a39b5b796d804bb784ea470236c69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ac51577d6ad0997b992a51043169d8a
SHA1d2d93fc42e451ffaeb548a7822c1e5e165646f0b
SHA2568458e0db2c7e0a4ef3b7c4d095847b3ed93f6e4e9d11ffc0bad8cae9f91e638f
SHA512a8dd42277ed7b33aad84d48e98b3b7ae5f52c074ec0b3b377a135b525603e925f4e40efdba2894ded73f61e8e53dc222100cb33b9ffd135236b794f16393e973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a5cb81fc06f70935af11d3f95f9b785
SHA11c93f5921e9427d93cb579432057a5f5cda8b8eb
SHA256f1e89dcf30234ff8afff5bff9b9ad9f4c7073677e56cc162c24ee968e43c176b
SHA512bdbf5aa725dda70edfbf986993bcb9070457ce81ab5b57f562027d6519862240bdc096cad6ac65db774b6554bbbdf4ef3fd34486511dc79c1cb8897957c7231b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50922473029d977db2b26cf00b34a874a
SHA1b9a3f8ed90cc8a298b8292fcbb69c42f86092689
SHA256cfba6ecfc2c6a125670f8d7e7042f18b5863347273e8bb09f482a84c00758b5e
SHA512640d2325011b1359d80d82217101f99ff1246a8e505ba58402aad31ad6168ba46ff99f7435b049f46e119b1860a257bd2e28c97170c7cef8313c2895a8468e5d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y1738IZL\plusone[1].js
Filesize63KB
MD565d165a4d38bfc0c83b38d98e488f063
SHA11c4ed17c5598a07358f88018a4872aa37ae8bc07
SHA256b1320e0dda0858c87971f7baa0d53063ad2a429d232fd06b0067bda8b9eeb0ec
SHA512abf4c755d88193e7e05398b6f934fc561d8e2adbee7d2170af399e145e54a4a8a93988e4af4e28d6240c0bd1bda7035ae97f67a85a471088820baae8d89f3d41
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b