Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 12:31
Static task
static1
Behavioral task
behavioral1
Sample
fc4dc762021d0995619a530a85235ebc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc4dc762021d0995619a530a85235ebc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc4dc762021d0995619a530a85235ebc_JaffaCakes118.html
-
Size
34KB
-
MD5
fc4dc762021d0995619a530a85235ebc
-
SHA1
661dc81b3ee244b4236f8f7e89dc389365540564
-
SHA256
2e258be908571e58a1f614118894f38c83a02f67b5478a677432a7ab5dbc606a
-
SHA512
95473fc75461d2a3a86a5d77865ca0117a33fa1d0b87c963f22259d2cc2dc38b5e76dfac07834d6ae368bd408be9b639f7a3dc260ec023e5d0e1d33429a01683
-
SSDEEP
192:uwjwb5ng6nQjxn5Q/fnQieeNnjnQOkEntpVnQTbndnQOgfcwqYycwqY+cwqYQA23:VQ/Wr+Q5A2WtKAJ/bbc/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6028f479a211db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000d077d64e2abc642b9fb5f11a462f67f45afddc259e3eeba22d9b24c1ef3160fb000000000e8000000002000020000000f6cbae24a7c82d8ea825d5ee73c9a645150b33cde9d90bc9509f633a8fe97679200000004647a66814237ac5b619b2313d63c0aea3f2d70413ce1ccdb1260d4fb005f8ea40000000e1dd26ffdc2013f7dee18ef921376061abd009ba35c87fb6131deb73a1ac1a4c4ce27b06040940900ab9c558e0ef31ebd262e02b127b1ce7d576621fd6c5bf4f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3C01B91-7D95-11EF-B36A-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433688579" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2284 2252 iexplore.exe 30 PID 2252 wrote to memory of 2284 2252 iexplore.exe 30 PID 2252 wrote to memory of 2284 2252 iexplore.exe 30 PID 2252 wrote to memory of 2284 2252 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc4dc762021d0995619a530a85235ebc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c8b292362ff280fc61521e3570e436e
SHA151f52bee3989dbd56728ce6d3d2e512cc5fa7e85
SHA25697c2fc1711443a7551475a19c4c105f959c9213ad4afb9340d2074714d9bff9a
SHA512adb5e23b8fb203680a4288dc8bb840ef617da672b31073bbf21ad692f4d25d0d3cd2e40de7b848d3e122c228358005650c4cd69d2f6864fcde494a3599d3b777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cee84f69c848b40124c3df5241d15b94
SHA1c786ba19bb28383fd903c6a67a66a481a7c3d030
SHA256a627e0eb107c3c4a3c19b23ba0c5e2be3ddd3cace456093efcde738d405c284d
SHA5127e679b6b2449b620d289d620f6111628d6531e371a8096da663c8d1f6c6d87c811dab8cffa99c88864fd63530a2a93f4fe2291dd8a322ec970b1f1d0d360d4cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5933c20f0816c0d4750da96a9045666ce
SHA196797ef6e179a86c8ad7cc07d57034495bfb8c38
SHA25622b232eab92c0eaf03527e89d6054a0cd2171a9f2062cd216b24080561fe3257
SHA51250d4f4914fde915eff59645bfeafb86f2a4c4b2e12dc19e04bae7939ad384e798fb8d5a76d005a70ccb15a61dfa30cdc296e81771877f671900c490fa808b836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e73596f51c4ac213b4109163222c6380
SHA1ac152d31f8b8422572610a6b100d1ab932d13fbc
SHA256837be278b405ba352d5db0475252e1ce0f8c903a5cabc5cba833164eab831642
SHA5121637064fb0c55d0d4255a620f7a453e00444a06f13545affe4ae5ab6f533e619edecbb75545c4e23f3c3a40d405bc21cfabd454e9901ef8ffe65a5253c010369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5605d2805222ff5be1f1334d3486632a7
SHA109ca7a6a72c1fc4b5c831cc58a4f018e12d728eb
SHA256aa508671e3365c95d17cde2c293b479a149c5685ba2fc94e596375f8eaad7415
SHA512a7442808890992cc690f4a8dd76b319e2432cce11d9d45ed373853c314b4062f3b6a1c8ab0e231109b57cb5ea96a5083412abca62b8e16f581e54519bb08f687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e45dbe81fb0a9440d9eace90cfe8ca68
SHA107c245bebe6813d09b53179bb19774406abdc4ed
SHA2560dde98b02ed6f1ef40db768f521d8e6685d831da5cae70aeb89bead166bb452c
SHA51264c5bb788ef2d3a87d6b2a6a217fa6f937b71983623ac168a3b75700cb36acb9936f304640337652f158488848060b7b7697fd2ecf60c1eab6854ff525bc8410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a57dddd27495052af3d60c3d36bbce
SHA1180058c43b0d82b9d29a6f5f1812f8880047762d
SHA25617556c7eeb95952fa51eacfbf83618568bc7542e03344f6a53393f48ef4190e2
SHA512debdbe21f7be18889941418513da06de3e782a66970aae39444e1e40122d43f9f8c85c684af2f95edfe2036a410978eb7b0048b8481760bbffb8798d1fd951d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5907d44bbcade28fd6a5bd864bbfe515b
SHA14ddbca34f40748a6ffc90ad0c66271397a3e1fe4
SHA256ab052e2d274e3211f90e27bbebf00352ee90a3eeaa5bd39435a60c94710eac14
SHA512a79ac7254ce9193ece1bca78dedf70476b0d67ec50881dcd1a0ac7db14e9f360cfff37c1f04c905a042bbc3e9f61300091fb1a7947bb669efb0ee00974c44915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d9a681844c7807d7678e7414850473d
SHA1fad42b66471f0d4299a08d54edad5165589bf2ef
SHA25611fde5061b3f8fff2d8b30e1a9d9bd469a691ee86d32d9fa1c8a0a5f6aaf8287
SHA512d0138a5cf201d7d7040b2f0423a76759ba9230ebb5e4a588362bae056bae15979b285ed8d518f2380350bcbf1df95ff9333a922aaee649ea39615b9330a4a30f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521b5f0ec8db046f8e9d1045c3cd2c321
SHA120cade0fb2d07cf4ffe72dbf0d638a59b31967df
SHA256b17a9c68f5a6d3a2fe52f85c56b22b83fd62e8f2331c4e284a0a68d136f36d6c
SHA5122720da469f5cd97c5ab4b543890002cf1ea892b018f64491c22f224796a42c5c20c41db12d351ac2bfba135dd600ae04ce3d7199c64ea6afef8d8a909a49671a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f38f5069fde012d4dc50836aea050f
SHA14cbfc0ebe20249befa221ead55f1269e6fa8ed61
SHA256d84a2e42e7614dd8e496f981421fee15b0bfb1d4fb9069ef9aeb64a300acab79
SHA5120f3ab64ceb8e5ecc50fcf51fa5da616eaa3018405f843fb3b79726bd8bc6a26f55170164e63465b02b33dcfdc097357f82b4cf9ad5faed7206d08757d92d7440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfacbcc4ea05731defc833a9d1af58cf
SHA1aec492c57b7ea681530d2801222e89300b79e6e0
SHA2561930ac094233808c790bd79e97738d12d123d00b8d57461b2919a481c7a00647
SHA512e6308e3db557c2ff2602aed45d9bf1f73c72e378604dfac5d3c29b7a13a2b03208911ae83d8afceeb58ff02d313ce3f763b15881a1acf579fa747d928382e7da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5647cff138a78a9dd99d025d10f387884
SHA17e972a8cb034207ce875a5fc2a965f793a3423be
SHA256411dde9215e4ce36950cbc8909990fdceb59784ef41b9d7b5af98cce1a639f13
SHA51262591eb67915b9047548cbedcba8b9637554c3816961c2d3d1c2ee0ad361f595b5866cedcf1ce1f53d47fbbfba3fba9bb99ad01080f542e65aaa6185e8d7b934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0af1cf92667dae3c1c12c3aacc82f9d
SHA1a01546b00121f425a2e13c122c0f9903b2f1cafc
SHA256bb71d14225cbe41a696cc856bb93e295b35b10eedf8d61e6a63ce0460596ca35
SHA512a1a40455f1ce764bc52063ea4bc3c4c6cad294ea5365c92ec146dba10d5a7b3bdb34a673660f1373d725005f92905a98d623820f900173c6b45d9843be37a880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f2b80203d0885fce1f1bdd2f96c3b0e
SHA1ebe3650b5a80f25efeeab17f5063be02c572bb39
SHA2564e2b6e120f0239157ba5ae8c8ecafa4f3a1cdee9a6858431ea1fb9363a47bba7
SHA51241b002ebec94dc9987d8caf5b4a463d0bd6d58b07e938bd9dc6589d5422db87b516d3e2484cf245402660899f8ca73d63207574062b1fdf24a9f32c0505cbefd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536e86c30855535b72584c7f9e53289dd
SHA10aee0644d6de597acd4e7e32fe35a10905e4146c
SHA256b20de94f6f28593fd5a12905447af5883601c89c0a6d6a920fda496f41fd59e3
SHA51263133a365f590bf0749dcb84c73b2675a95a492b4f8d3916adf2fff1bb4161e61af00f8d5bb79f0d3e4e67dcb3bd0fb2af8281ce480d02c7c0fc85d79aef06c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bcb66962907d19b744cc4fad601f14a
SHA1c5efd3a70d14f3d1987df35f1ea66a657522eb89
SHA256915fb4d3dd208cc8feeff94b7c90a8e9040c1f74e7ca02d8c5c5cfa87854e0e7
SHA5127914d42631b607c6632e213dfea681faebc021637aa1fe1757639189227c9c4801ab5855f11db5accab9c44a630535c96f085b886429e9da3067326305bfdb04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59622c8a89242cca27140eabb76fe1903
SHA15550a2f6cb0a3d4789626c300b80268da55b8690
SHA256a12a05fec3ffc321d3c38e3230847f4e8a8f49379d599e3c9c91508657b22084
SHA512e072f181ee4936d3796a075bfae4a5943a1fce11088b69c734f25d408a68d402276006b05bf2449403600c04974d6eabe145495c139662f68b064b8e07f258dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554a3fd1587d4633d6f9a264967b1b65d
SHA130e81f6590c653a6d6ac323a63cf5480b672d1bd
SHA256b244e66ba1db64ea484f9020c92d2016b2cf58eb89a8346f64ece3ee78a7d87e
SHA512f40ca1424601f1c0b56a65d0f9e38f89a14dc7bec7e139f42a17be10ac23e75ce55c6a64bfa172a169bbace88a0310073243e460007d2b4020f087449da96668
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b