Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 11:41
Static task
static1
Behavioral task
behavioral1
Sample
fe73b9fba503305b9032a121f385b69d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe73b9fba503305b9032a121f385b69d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe73b9fba503305b9032a121f385b69d_JaffaCakes118.html
-
Size
36KB
-
MD5
fe73b9fba503305b9032a121f385b69d
-
SHA1
afa75f0d0560e8a15b14df9e9dabb7d3d160a5da
-
SHA256
a56958719671faab0a9f70278290ce09066dfdfab5af12a0c4069a734f36596a
-
SHA512
11d52c2f61e6048b50172d4c0eea35ca5f53e12d7dbd5b75dec65051d595d86afd150266ef0fcdc1b49e190ee0f1247c79374d5390f89c904033465fa2e28809
-
SSDEEP
768:Ls+rjIrCkCVCvCvCPCPCCCCCyCyCpCpC1C1C1C1C1C1C5yrvyOndV7Bvl:Ls+rjIrBEwwaaFFPPwwmmmmmmIyrvyOn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000002e97ab1ea8bbadafeb6113dc5e49b13c2be021e7b91cbc65144bc740598908c7000000000e8000000002000020000000094b04dae22d980ce3787ab2f6c990f3e7d7971058fee56d441d3f28b4fdb3db9000000061837e83e94d3df50a9127493f48e67e21fc9a0867d4d61c8b75fb96aa383ccdf20dced5166e73274110477eb2556e72f1885dc387b69857a66b1894d830cb9a5d7dc37ab8eacfa8d5199a74c60985e9351f42fab8d9d88cf323d18dcdb0d24718db4e611ea627f273ed8ff5f182047ee3c4b4736808da5a82c3c2871d829bccb4a725897f6ceb0e5bd854045e98391240000000020dcfe5d215797866a3b89eb84a6082de4c67365ebd0fa998ef277434998ef1ba62c837dd9fd32668f410a9039301aed48351160320a37622a5489c2f280c4a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000056e924153366e91deb5611705e56810a48fc1c8972cea81bca84f01a4f2fa204000000000e80000000020000200000004b62298eea40eae6a0e15af846f3d5408c8d212f977b38bfc410ef0be31efef22000000057746f824a5ece411ebf5637b42fa9be7dcccd568a75165cba4f5c1181b82e13400000002c379fa64aaf9251a288f91fbbfd8ad5bf24d573e745df41d5aab953f694c447b3ef80b6f0b12bf0a84344c15fe47572b114799fe2b40ea1ef874b089d8becb5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0044dd946412db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA2DA9C1-7E57-11EF-B594-F245C6AC432F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433771939" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1652 2292 iexplore.exe 28 PID 2292 wrote to memory of 1652 2292 iexplore.exe 28 PID 2292 wrote to memory of 1652 2292 iexplore.exe 28 PID 2292 wrote to memory of 1652 2292 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe73b9fba503305b9032a121f385b69d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5711f9752293c113f80e1b81715b1a7db
SHA1838ebd03c6e022277bbe627bf1ffe7da23eb1a77
SHA2561415c8ae1f7bd7ad8b0e371996effe91d6eb2bd698d7ab2601b4525e74744cd2
SHA51299e6a1fbe0c1599bd9aca9fb025f72c914d34fbd35c8f4ff245243776ec4e0e787aed45ce46f54a99dbb7071268f34c5f226ddfd5c948eb1162cfd66b624d98d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c2c33175cc370ea3d96271f4140761b
SHA1798712b8e565b026d33223a04814ec3ca5343740
SHA256381e4b1e0b89a9c7fe26aa8914a6cc1c5f784ca90e8cd0f02299b2327cc9f8bc
SHA512330d9b0c199dbe302c17c6f180fe2da5beaf68681a3218b85737dc624c6ed95e4682ca4930002eb7b35cd1cb41f0468debda14cb1915c07a636beb83a7120f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fc4090b1e55689e7471abab4d16b7d9
SHA19f8c2fc3c0486debd8ad7545b2b987e641d7203a
SHA2563fb2e3fd810a32540f097f1738dd31608c97eca8e15f1d6a463d0dec3e097baa
SHA51282e10d40872cd583f51061afd8a97de5e57cb9bdc7642a0a878f2948a6326eaaadbe4fb080384651379e8f578ab1a62b8f7e32b25a838e8b0e6728df00efff84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecb2342376cee25bdc383a67c512cd57
SHA184813ca7f177cd5ab028324d2755cbdd8c7a8acc
SHA2562bc5db0e9be05fa15500d34220bbfabb588813630b97074971edf1629d04c759
SHA5122fc88e2002e5b97bc50b11c101c3babb6e49489d83abb64baf9d73085e7d2893b621e42cbf6a2686ba72330a5a3d2609005dcc8786088e2a33490897c932b55d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cbde768f6e07a1100dd1c6ee5f773ec
SHA1e75fe47a682c6dee894cf03732723e662ed22125
SHA2560f687a4e1135839e838c6053ee07f3e260af85265258c55a962c98ac9bbc86b4
SHA5127b484222d52032904272cc78048a69a545ec53fb75bd13df22a67779780e34caeae8aee9ee2af2052519fa34ab14ca919108d9af12aa708b798bb87ec3a5d217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f2706fd7d30bd0085209722cbe50784
SHA17a0c25ceb4397553e1016bfc00929130dd37223a
SHA2560a1808cad26de4fd80a838a38ea42fb15c37fe5e6e26f24c7431be1eeb9d0403
SHA512fecd75870f427767558d820b9c1b227a022fc7ac1553408ad42cb114119435358ef5ed18d877c9c8d6313e099b15da47b81a0d7bbceaca370e77a34a07107f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d6f878d8913ca5ffb977d539639ba4e
SHA1158757e88e2075d34fe83da7e501eea6d96362af
SHA256b161dcfd5408a1b74cab230730e3570a83ef577a3609966b47ecc73274c3c9b0
SHA5125c710e07d3437b186152299792643a438bbcfe4780fdef914a50866cb1378ca0e74345a2451802400fe02fc48188ee79ff269f6d96cbc25c9c875132e17592ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571494e7c968256012c82e2675ceacaae
SHA113c6ad0347c09ccd41b840cdda727e823074eba4
SHA256ac326a3239752986033b5915a6d5e10a763c432a1b699130385722cdcc5e34f2
SHA51228e761976b77106db7629fec40cfb3af8d22f611a88c155082b799ea43e83c28f6c8ba10acf23395b5875ba4f8115d381319e708ea5837092cb5ff46744e6edf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db3b070749188b98574f8d3b24d5d3d7
SHA15ec9898451e13645f9e7121e4b9c9cb4c8d8f1a0
SHA256d8d92288ae1e68f63a547b29ee96917aa32aa37f043d665593fcd0da351bb5a1
SHA512af98639bd5566890e7c3ab58054ee8eeb0e57cce7c2588a4ec7eb11ac2dae0996fc81bd9e23d191c9a0857639a56beca99ddebd2d6d3164a9a30f0713d2ed8fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c6f3974b0e2efdd5d33a144bccd4039
SHA16863deaddcc54881ce64c969216e7ecedcba7b9c
SHA2567ff872e6de9dbe1ed437b9f52bdc6add77941fa4d8f4331b7e17d29ef6c975ad
SHA512407e19dad5fb91e3e1228c9f4ed3fec27346c3a45ecced1faccadd55e095973355037c99e981c9c6d91f9c9aab30c8ef323a773a7487e0624fd75ad2ebef5a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec4c2e1276645ade13664a3803393662
SHA1e89f0d206c3d355760b2477df82eb9ffba105f36
SHA2569ff56e6897a4c072ee17c8a5e61b6e22f7e991a2b9234b5ef4053dfbbcd906bd
SHA5121a5ed0d978726d019934b8af7e82bdb9c94f8eb0034d3c0b600ef93dd08ded8955296f1fd3f380fabceb8ba6baa9f6d0c21e379f36e4e70100688bf4d4d0dd54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c662e0c63e68c174174351444e6e4e44
SHA19a5b19b14156f443752e2401f057a98553aad206
SHA256b685a38adeb7819a581e67697b48108886411f48e7fa8767ba4abfb388c4c8da
SHA512747649713607cf68b4a9028fb7bddab714f3cae39759847f62d5cf8af51e4b450f176bc8a5c47a4be0099514d07be4b22a1b543817b9e95b13bbb0f1a4cf9a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a69aec807a5cf5c45742b6141681c99
SHA17bc1992021d3dbc0ba64d26495e77fa260ea9be1
SHA2568e7a555709ffffb18754b94d9b0019c8090d3a46077340cd17a314f95e11101d
SHA512f287d1d1746f414a079b13baee93724e4e004f3beb276cb301c73f1cb1a8c1704630d2dfd47880ede668dbbef7fc941dc46533f4bd1232e6b9008eb3b7981845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517576b7481ef2b47c6cfbb332eeccd7b
SHA1195a07e2faca5ab688d1b32a3ffe89cf6ea39dc7
SHA256a11b7e3bdd8f55216bde5ec4c69f268cc89aa14df152c84f5fa61d63299ba0c8
SHA5126643aafadce59a6e5e421f58a91b7c08f544ab25c85bb74569a2889153461c198174a1770b33b61ecee22de686a3ffac50eac8c2b87e9f27f00edfc393c8d970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ea5e02457470b810e0a05a33c36e5bd
SHA13fa91de788b5756b037f03b8b6a81f8a28dc1dbb
SHA2568eecc725b7ded5224d38eef9f716fbdc0b2b6fc4191b050d939deb43961d7a53
SHA512d3bfc3dcd983802e727552cc6f2ae288add926104c118449339339ed785393b7e25336842c2da04b2c36919a987e6964ca88383ca145c93fd1e783683fa40e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f53e3e8c70d7f8756933d9cdc1df1103
SHA195fa79090694bbac9374421f81ee5e479c69dcec
SHA2562349216555d0fb831cec91e0468fae1b6e4912d4703af01e3efb105b60897eda
SHA51282338d16a1a3762fe5f091054fe327d16eaeca7614abcad888df4c79acd38fd929fc4d21c73d2666c9246ec655cba3690f7a7b34553a175134ef423f804255d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50272ea50933005f90d7d02bcbe9119aa
SHA19fa9afc911ecc7d798d439601da6b23da6db1b17
SHA256bda0b8fb5d629f3eeb5da615144582e7b1d252002613ef6ab62deb5673b30f78
SHA512608ce3b67d87fa33894ee080011cd3fb2e940c72e88a46037a3668a28db3756f1306612da40a0431dac40383c10f3d1256c8e9ce2bab2c8a7528b7a816def668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e3f233f2b8de056d70fd1ddf458af61
SHA129acc26dfa44ff23f04c573e31fe24eb6dc29e2b
SHA25612aaa4f29770be91d3689d0e7001013567668e5083bb434d7664b8d240b66eb0
SHA5124aeaecd01fccc8ef1e3e4c636215262263e9cb1ce41b7a7ea74738e928c95faee86c4d10d12b76e3ae6beec9b5019d0678ab4a89d0f91f99eb976c53dd049bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58977dcb16075ee0bb0122a53f672301b
SHA1b2df8d1fcddedf91a39c73d3881f34162d7c6fb6
SHA256623a09bb7b757e5105fc54e0c1909ab5259c6c1d2ed607dfbaa972c7dceb74e3
SHA51258cb88b5c1583d304ed19bb7c22a11b2e7e0ac4916d286304f2f989f78cde2cf8505af59febb17c3a1932a09b8be3f2e30b488e3111bd4208125f090392d64c6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b