Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
fa6d634ad2b6dc659980e33becb69559_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa6d634ad2b6dc659980e33becb69559_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa6d634ad2b6dc659980e33becb69559_JaffaCakes118.html
-
Size
20KB
-
MD5
fa6d634ad2b6dc659980e33becb69559
-
SHA1
d941f267efd471b4b09937f4527d74b44a8f8ddb
-
SHA256
6f9d4c848fb824ce5d91c815d47545fdca1c33331aa6fee0a2e9ab665d33935c
-
SHA512
a1c1ebd935934356cb8811d7488953f8158baac633ad2ef5df410ed3ead09208fb1d88f38db51fda0afa2ea144159afe0bbc6910ee92b4bfcf7d3205a093a14d
-
SSDEEP
384:0yRrpiSYhMVAe1ufIq61gy2RagQ4pAS9qgtgcVfrXK132mu:HFiSjGLfIoQqFbXrXK1Gmu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2018fd0bdb10db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35FF1F11-7CCE-11EF-A087-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000f3c02bfb501ad39884e862af2a30407358c114cc809fc3039ea36ab37942cb03000000000e8000000002000020000000d00dba0477a6fcd29670336564419b10debe6eac67e545dea1f83b819e1bf31220000000aa774c0ce2ceb808ba8ffeac7be64237f6f40476e660c081a71c73051430a33b400000007b402f4dc6f3e56d442785ae04b5c057ec4f1951f695cab097fa6bcc99b045ba957f50ad76a834ab708eb7d8f94f36c983a2ca0d1f666b14479e76b51a96990b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433602926" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2112 2532 iexplore.exe 30 PID 2532 wrote to memory of 2112 2532 iexplore.exe 30 PID 2532 wrote to memory of 2112 2532 iexplore.exe 30 PID 2532 wrote to memory of 2112 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa6d634ad2b6dc659980e33becb69559_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57743025d999552338f4b8b94499b8fd2
SHA1d1cdbb6fece78391a1619a090a004325b26c3b87
SHA25651ef237adfaf9056e85e153545477f1d827627b4e888ab582ee24bc7388c6207
SHA51242c0e5b37a09b9b8d98e320905004b9f1200a74c7bbbcb9d6bd02ed0ae9240fb413c6b9ba8fb71bb9f0391f868b5ab825b63bf6693fd1be05dad748da27d49b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b46f924cd57014aa488210a89bf60523
SHA151a51e8417199336f4c7b16455da43ba647f9dbe
SHA256fc4a1a01e5dccdd31058fb1fc21f312d842c9ef0e8a45016c006c00a180d7e55
SHA5128b52eb0bd097e640c6f3a1b2aec5844b0f17aec1478aa2c18d9eeec56cf8aafd5d5db2b033c8e1e9173d295fa9965302400442eaaafd078a9a479d56527156b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ead4de0d7e525f9d4e85ca720ae9a82
SHA1d80b94de714fbc417a539cc1bdbda21b64cb1f7a
SHA256526ae1a4d2bb6f1d1e806b52492ab2ed9b1e70af97c5b096d0788d68eca593e6
SHA512b82034c9dc3b4cc4f4b7bc6206e5778ea96e21a2253270305f1154b6a3c6c2e0412ca23e694a4fb44d4491218894ca2ee8b68a5a5f2bd39ebc553d8854f0df0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56edaa0b0b0602a62e0d231cbeb49defb
SHA179e257e9974052778403d91a1ec638e30d0f040c
SHA256bd4df41e3e23ecfc5b4c15c192ad74d0f4e250e8277964507c6bb0f7cf1d1785
SHA512c4e2db2c9097f7f4788dcb3996a84cf1e717372adcb30d22b36a1294411cd6ff126bbb9f80e4e877977ea07a754d41d7fed663302a92916ee0fdfc15de19062d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e3a1f808473c1daa095ef7224ec2e72
SHA18c09a61da9b1348041f3cdd434e86320222806e1
SHA25652f61ea62337343dd9bbda2079040f9f8ce3633b36cbe723d39c1c77455a1483
SHA51292e6c430943c836a266dc7753c0df71e2488957ab96a0268e73a92d6c6359d3ef907c75ca818aecbde63c7f6b21b770a0e41abaf4b39eea854498757d108b972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571658398f4e93beba371ffc45106aa45
SHA1bb2c6976eba63d8be4e1b63ccb33921e56184dbb
SHA256a619e42bd7e8d6dc03ad0d3ca23fc7b82aa258276c8096145d2968629a989260
SHA512b06bfd23a49810914277cfa89bc3dd38f70ee9c87398af8a60a33638eecea37077f9aa11993ff26d0769f681584a844461391ba5a06a4d3f8b3d5df7508387bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a4455898392802b02e3e0dad4d88c1c
SHA10c5fc1825f98dffc143399e4ae072a03e1302ac7
SHA256c2c20873af1e664de4c892b9776407629bc68f7833bf699cf84e973efea471b8
SHA512d0c90d7ffda59f2a632d4699c1945fe0f8fe064f7350eff74d8db7b9af310450381e5f57a9c410cd28b9e610ccbedf27eae59deb1f973c3d8b3b93fc30c14ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bb9fcaed1c7f43741e348efa5ae35aa
SHA131d65313b8f9bf8d20c4cd0101acb9a38d8f796e
SHA2566fb21feaee8da500f5cd450cee1fed40ff28c4e2ef3347069dfc36d89efedccc
SHA512a190b54386ec26265f82f8c41b426f08ba827494d8a772890f4799694582c8fe35fd8a4499eb33af70910f7ffc12a909ea99e7b9481d8af4a106c72873805ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507f0a8da40a0ed2d5427de96e231679e
SHA1ec63b8e8f89bbfbb68cfa7e5318af3b12d3ac226
SHA256f62a038d7c483d0da4c1df4accfee1b4618882df58361df743ab4d9611170175
SHA5126161c4ec7be6b59ac5542554f84444d3a06e97f6a0ae3454fd594b0d0f7658da6fff62d84cb034b71c9ea4358723533831e51ea3882916aed3a59d4a8530da63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5706201f50abacabdb47768de1b217263
SHA18ba9b67bc1f80c2f0a51a8420db403efc16a447a
SHA256bfa4254143317be0d77e7f305e6c73ad8923117706e80bee686105f832f4b447
SHA5123f244edce19af1e1806d5e8198b316908a0315e1d0ce807a52632b0fb8edc9d397341fa06f1bfd289afb8379fee810457bd1d290868c37362c978df5a23c7861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571242f9ac6acc836b83387641965d744
SHA10a8cc887b12c46e7b9385bc4ed9a85155496a6d3
SHA256a8ce59407b4950f8a745112c08324215f152b8e01db4a7ccf5d8aa4036df5664
SHA512aa470c854cf501c4ec15e259df766ff49516d6a449f47a3c15ab850dfb403074bb73b269c79c0fd9a74aff74c362f28d4e3ab9a22b137065cc27f30a7bb61b3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1c2d8b001d293d3c3caad3af8a7d980
SHA1ff7c5fbde4c83532272fce638c176da5eb676016
SHA256775602d01df5435bd8b63baafb2215a3022da044b36b5626f374368b08762a54
SHA51261f9a0eb6d7c6dc69c23a10f559829a49813a16b7e885673f791d38942f7ccf009c847e5e18fac01f53a2e59df302ef828704ab9f2a4315f9d30280df9735c7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ecaeba37a7e0d33c6d5b395adba1d5c
SHA17fe2be8cab6bb6c1bed8305123f6994661650137
SHA25660dd65ae1ac3f6913a909178c9bd75e112212746efe8abcde70d27eb17193347
SHA512a0e4e04623ecde1691513f1f8eecd8465e1e6c254ee8cbf97a81d60502f0540c6ab18bc1663b7ca611ce1bdf0300a4883abb6469ab7870b588d9a7f4f8aedb2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504ef1bc26f5b98fee44fe6b89340f605
SHA1cbd8eceb7de08b4f81d29261b091737bf64b2e31
SHA2568bb76eee6f25c9eca950feaf0982f8abf1a1a633af2d0eeee94a2d66b8221c45
SHA51245706f8102ca35e74be8a97135b0f2fb1f56e9f548c4a4cd470655325b37ae35796b21ce05487cfad27c48e37762ca1218c6ed3204c3220331bd742771b58b31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae759c4823fe99744cdab8f6261d5e33
SHA1fc6ad73198af29b36db2162e6bf40f423a1e42eb
SHA256348c3ff0b5fdb5c16bf99f0beceda5e712b2e8d823eabc265a64c971620f3fe7
SHA51280207f45db9806e8d7ff3380335e09071ed79c23c94ecccde4f9913412ba2008b2e276b8c43248e570c0b7633afde45aee83a4cd6ba894fef8011b68faeb6dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf0a657013c37b45c7927a7e97a52d07
SHA111db6b81944aeaf306ad1b3413fcb01eca619b3a
SHA2563982794972c9709cc56df49ef24fe80de873fe49ba2a6747de2b87dd36f5b54e
SHA5125166911d3c3b7ed277e7238f03e472479fcd07e18584c640a2f2c92ce08bd5423e8827709d7ba5c42ac6db618993659e2d0dd5118993bfe3d2b69c9eabbe42bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f474b13682071935cbd7b3046b9f340
SHA19bef7420798e87e64201c4b0c909a97dfc8b0ff5
SHA25676bf61b90303916edf361f5a34d094f3caeeed0e20a8250d415f65009ce15b3d
SHA512e41e7dd762147b1e1cfa6571c225f8bc7fadb4fddc2bf0b2191fcf9906f00bb5cc69eeb15fe458ba530755ce8bb1f037fc00558d1546ac9e1de6064ccde8c3e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597cca9579fbf18ab84bb193a28fde1cc
SHA10a0a4502c58cd537d586a4e678cbeea620eaf7e8
SHA256d82a9c3c61ab348f5c22b745b1dbf11bbd7bf2930cff11b57dda58855de06846
SHA512e8532e6cf954b0bf7cfd3289adc7dce7558ba7d502bc0b6abd9d5b5ab196b5433cbfb3b6351a2e60799417aaa9a62f3741b06d196ed237cc1d6c35be79df90dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f58f9d155f952c461d8488dcfc9ba02
SHA191bae865814c2b794c634ccb86b4b60b23380e92
SHA256a3f3adecca1d78111935d52fb7218be52e600c8382188983b2a6d8715322958d
SHA512d9be40a811d341ea76901d911ef7a6d2544357e10e7a9dfb7f5521905a188c7f2149f139d0867d4fc95bda18f241b6433c5cf622f0dd1484f3d628b7d82b01f8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b