Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 09:55
Static task
static1
Behavioral task
behavioral1
Sample
dff42cddb004db7736645bd5a6bd4e87_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dff42cddb004db7736645bd5a6bd4e87_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dff42cddb004db7736645bd5a6bd4e87_JaffaCakes118.html
-
Size
70KB
-
MD5
dff42cddb004db7736645bd5a6bd4e87
-
SHA1
bb479bd75d529253527d73756445cb67ba48571a
-
SHA256
8fd008bbeeb1f2205c3c1270b7f7d80dec71f53fc29614b0596ff08d67c48755
-
SHA512
1c3b1e7e22caf1c34d3fed1afe24142f1cc8019a1cc840b4efed7f3d1ecb219c4c9d1fe511dc8d08585fadaa84aee49aa6c3014c11a4cf2ccce2e6291ce18e84
-
SSDEEP
768:JiugcMWR3sI2PDDnd0g6rTo7xeHoTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVu:JWxTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432469583" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000000e58bb25e322d3dcd24d028af4259ee4c23f3e2c1e87eaa4e8760307448d711c000000000e80000000020000200000006f4a001922082e28c9c7e0b25f3196eacebb00416b3369c1e7f9aaa35c4c985490000000aa09e94f3ba16e0e83e9644c17f3b2d9a0259436ede74b227cafdbc76bcf154e85be7593bb7dee540830856bae6fa047efec51b6a059f1f86020b82c7059abe229dcd2e13ccd33301b1e02fb177b92794bac91f235db107c18550a0e2971aa27b78df727bbe1df7bb9663417ed55a613d6bec01b8f9d51f3a6ac8906a4720b04ea93773959685570fb551c1ee07b0c364000000095656eab39000db0ebcdf357995b810423430d6ca0328731625a3dad7b8ef6a3eefc642ebc9d8e6c7881c7a36bb82c2d324fdc024629882860705859aa1908c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000e1db96159124003bf178941be702a22e3301b33a95812e0a637aeb1e7271212d000000000e8000000002000020000000f01f8bd9f6772ca73471963948ec55a84b144726794c1fb3abbf9f4a599ca498200000004381fdbbaea354b6f7be1e313b5df23804607997a4ebaa29cc07479b25a32823400000009d9a0dbbd1b8b06303075b7318d128884e644db499c59ccd687f4030c0c92ba16a3e42b5e7cb2b335a1f0a418a7ee2a523aa4c234ca3776aa95e0a76c38f17b9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 505cb0478c06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{718538C1-727F-11EF-ADF2-46BBF83CD43C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 3040 2084 iexplore.exe 30 PID 2084 wrote to memory of 3040 2084 iexplore.exe 30 PID 2084 wrote to memory of 3040 2084 iexplore.exe 30 PID 2084 wrote to memory of 3040 2084 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dff42cddb004db7736645bd5a6bd4e87_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583716d20ce6a582fce92a74941dbd5b7
SHA1a5d3d8f57d485cda93fc9f0ee674b20f0781cdb5
SHA256a84c6f69b4fb47a3ca275eee5ddb94d2c45d965756662eb401f4c8509c236b15
SHA512092da9aba944796e359294a2441c492978f6d0e320ab4856da48a2d440036778a5a249ea3f47771db805a60f5339ae6d8da9e695dbcc87053151feac3e3aa220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac896d7c71e23ddd9b5e9eb4774fe2ab
SHA176f8584510c040120379ee7f1e493953c021c39b
SHA256f3c1321d17932fa0f0882248a1d17bef05260916a20897c07a94a54d7dcf63b4
SHA512500f7c251427d5dc9548346d1aff6b5c0831a699cbc81dcd342030c307f6ced9e52428910f8e47da83387fa78b7f28bc7572f46a00171167621ae1b319ffd0fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51be61b13adb51ddf47f58f59bed33fb8
SHA1b2a19d2520d42c8197fe2e42cb269237d13335d7
SHA25615051b5b4016f30d108993a8389743d20122108fa8ae796edc00a66214580c79
SHA5123e1272b885f50f6658a465a429311307d36c1b92acf78c87109ded6aa5ba190dc6d45ee1c4b21387b17acb2370982237f56eb8daa4a3dc2ffd033ff572e2c71b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ddfb3453794fca6f70be2f3a37478e3
SHA1aebd08c9d17ae85f55fa12b81ead98c9d43ea266
SHA256eca1929f83cfd5c809f49c5f5be7f952b49f5acba509038ee079c92e0aa8f711
SHA5123f2b60e34dc9e7a2f6b16f4489c8ce5b5ab110e5b742131df3e9232add884f5ff5d907e590b534277ea62f3e8da206a2fb7181666488bf0a9dda4bbda3d5f454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589c353ad4fb612b8a0fc12a390d63890
SHA15ea6e69b00151e8d11381f627d67a0de35c5608e
SHA2566da151fd9d27f9678b6a92ec495b372dfb689ed0b5c91953398cfa06d2d1f0b3
SHA512f15da9730d3f401565e899d1d1d21cd739cdb519a6e11df598cebba22c42d38c19fd9ee90ac55a9d24ea02a64a63ba92c0ab756e3907bc735178ce224f7c5b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba4596b8c4f8742ebbb3dc9b9ef5df1d
SHA1360854fafaa0ddfdfa4203107b77677dffc26506
SHA2561599f0c3e671937bdbda40a1a257bed899fb40189cb1bb11f4607fff08176152
SHA51256bc6aaab2548d6165e0d3eeef07e05d6b6512f2f164d8acfa54aec65d1884f6edf7e8593739414f27ef07b754d8eb87067c3576bcbbabe836bc114a0fd611f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d27c2fea13fa66b7f8c1e2384ad99e0b
SHA1866dcac75f31e6e936d26a4ae9d3d0c7e826fe64
SHA256c99c6d1478b32f6140f4b58beac06e0b0886f812d75242478bd8fcc1f789aaa4
SHA5127958c8597d0751ea8da3c8895b75c25011e12f5d3e39c25f7ddff983ff25458cef0a818a877aca452fc606d2d947678f7ba90680427d7367736fb54899eea605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505ddc68d2cf7d5efc4cf6595a3fdbd63
SHA12394242c4ff9f566a2e8ba0b312696948acac1f2
SHA2567cc9c665dd851c6a06abcb8abe6eaf834a70d94122cb6a283a3085fea0ce4562
SHA512e8defc87c036aa1ef99b9e31fea50854d1d237b0faa9854d39cd95c31834842157226708256380da683700cbfcbeb8393db7ba2b1fb61f838b1d60f267a84d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1eaecc5a78736b2330e6af764ebfa7e
SHA104e3a3a3948a4c87c37eddfa82d88e8c5851df10
SHA25673e56dfdeb11334522c9797f1ef23740b9b36ed04bc3c22680abe89305b580ba
SHA512eee26428fd7e6a7b8e1a40f9573e1708bc04a6d097562f31fea3abe16b2eb6b4b9427e3910779efde990bb7f4dc14ea023d7f1e7ac284e52cfabec3fe7a4a313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c1fac0ab73e452168b9a3afc8e8c10f
SHA15784cd55ac62808e40446c347ea381f764346a71
SHA256015996bb390fa5006777c54e020ba8deea1c9d9f458864a07b095257ec0e27e6
SHA51208b66066f1fb853d1ae189a97b4172d23a5745b9faf70e3b27670f69e44a3db51f428f009f5a3f1be48add012e5610f0ef99a658f57d28c4789575237b67b09a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5c0b6d7a28dfec5ecd31cd7917c1c75
SHA1c19fbdd70985fd6912f94bc8329c3f0652b0144e
SHA25665b4e9cab062ec0757a9799780ae681903b87a7724c78742255e4850586f0333
SHA5120cdaf1e6b3a33e7b54f0017970b4c0d6a47c06d214f7be6dbdabfd5f781da176bc76db73415475cdae4eeece6ce7543636fa80819bca1b61e862b27bd27cff10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575a43d0b95395c95d024812835e03e03
SHA1178fc6528fcdfd27bebef6070bb905ca0642623b
SHA2563af4499bf37a268f2f3f08df43ff606a8c38ed147aa91e72df22996959a364d6
SHA512dc8f24b02b4758b913f1629fe2e2df33cf7af1e1ecf4831fc754f646ae8806f31ea594419c2aed769d51cab3c6782607f75382a7bf032f85b7e7b25a7cc583c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53759e151f4332e7434a21efe71a37f41
SHA159abb0ef3572e1532e8b03dcb5275e88c5f9c0dc
SHA256360e471a33057d1312f175bbca617c4822536beb9b27df04fd6e677e0c626032
SHA51211072d3dea71297d6864d1182e2f79ac1955554de998176d461819a7b3969169a2fda426bd817416a113ce26e66a52221ee933eafd08da3be63daddded2ae387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea4a17a78eb62c277933d8177d7e1527
SHA14149e2ddde80e891aa1df09e07a11dd5e79a8f8d
SHA25638e59753d37ca42e5ca7b7d82c5a9d55f79f8b035f051b04a1618512960e3044
SHA512bbb3a606c322b1e5db82110e1c6d98338f3a41f1b9a0a9ff2a83e625c0b5bb86d849e81d88e99101f87465a1b9b8369647a684a580bf1b42aca07943a6a04747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1eb10d1a34934da9422b160fb5d63c1
SHA169c7a0340e999123a4b34e45acd60e81913d0048
SHA256a72762dc8487507144bbf05376c605ba5c2ae8bcfe9391b708df6a74d6a4deca
SHA512ee1d40e04a6243440d505ea7c89f4745b21eed77e5166789d152a84f75828279a12fa430377eb731e2d61f6406f7af716e624629376c66be68f1d96f70f386c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a991b46271fdb2cce65853eb8b1c855
SHA1a2984cb1d371442d961d6c72df4ef573ec532d2b
SHA25659144c6937d9f9df1b0446d3e7696cf3e464fc2b4646604b2e1ed9b0abf1a0e6
SHA5124b054b7ce704f1d32274b3a805e3eb5ad7012cc791835d22e4615c1b1b14f4f223c25e0e74bda8d3294c7be4dccb0e8dd59a6ec8108fd2a9e04b68c36eb8de2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f85aed89ece56b9c12b4e3f218e33ab6
SHA155fb6ee896b1296bddf332c3e53b32b09c8a2864
SHA2564cbe41ccd9847c1cb3bbda967543068faf79291152d025072940fdbdb182c186
SHA51278c848aa688833339d9ab25c845d3d243695fd1198e7743f2cd3c4f090ddfa2304d96252def9f540c7cbef4cdcb2e30857f32130ef9edd0f0d5961d9cabb15fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0508853e33239a21d1b4563767eaa6c
SHA19f6fc0e317391c678553d63971e90e71ad30f005
SHA2568533619f94f751dec551d7d3fb33450cbc23809d6fd4b8ac4838c0d0c7ae8e7b
SHA5126616f602961e96eb8ac8b8efd03edf20f9330b23f3de2e18dd14894cff6ce2ec98672d6f68ab10e1ddf16a4d8a0e8df8e6266e348576ccbcdbcc417de443b1ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb4ab5e4cb3a5d29508053e6c3e14177
SHA1d442ebbaf18da899953b53a97d78be4a8ef1e955
SHA2563434a9d39e5f98df5f71b101cea02a692c9c19f362db11b2884e9933b00dfa50
SHA5126ef5cd728882a69ecccd4dc919b6a479e82d0179a5db1570e82b79737afe3bf1355e4e803d47a42305816270491da3fc5bc2394bb138d68a8817a9246cac5abd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b