Analysis
-
max time kernel
142s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 00:45
Static task
static1
Behavioral task
behavioral1
Sample
44fd9f3062a2b8dfeb4ecfe1861ae963_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
44fd9f3062a2b8dfeb4ecfe1861ae963_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
44fd9f3062a2b8dfeb4ecfe1861ae963_JaffaCakes118.html
-
Size
139KB
-
MD5
44fd9f3062a2b8dfeb4ecfe1861ae963
-
SHA1
df778de7d30c07280f6f810488f286a1fff6305e
-
SHA256
56eff356c18f88f253715bd23710eb96623dc1f0a846a7f8d00d1b38982d97d9
-
SHA512
858363c458449b96aded9fe2c69c493ec690ba0e37bf5ed6b2fd679df8ba30033e2b6f2acd266030d8a449e7934a9d620287605e503bcc94bfd34345a1a8b65c
-
SSDEEP
1536:SyzGvaIcm4ABw/rGmlhyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:SykoyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435115000" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b13190000000002000000000010660000000100002000000052a0ea19d6699af1cad7519478dad994454984c5f2cedf29aa2652e68ef5bc18000000000e8000000002000020000000c165c02828683114d0726a5087dcdb3bef6533fa77bbd07f5a84f40f108eb821200000007f580afca277f096e4e7101df1fab2b9003b2dca0d2ac3759736e4169136c73a400000006dd7880927ce4045a746968ea53973612a7302b09445c860e1ca54b12f5443e93821115a86d8a2e8390a6f5bac6f2f2a53b527bd0993a9adc7171a147680620c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C7C227D1-8A8E-11EF-B232-FE373C151053} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7063a2de9b1edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 572 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 572 iexplore.exe 572 iexplore.exe 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 572 wrote to memory of 2228 572 iexplore.exe 29 PID 572 wrote to memory of 2228 572 iexplore.exe 29 PID 572 wrote to memory of 2228 572 iexplore.exe 29 PID 572 wrote to memory of 2228 572 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\44fd9f3062a2b8dfeb4ecfe1861ae963_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:572 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543c99de4c4d72e31881ed2fccc594d6
SHA1f11d37aee0775e76f5a7346020528bd4be219eae
SHA2560c657ad822ea560b69b0b5754c654ed99bfd736379c8f0badd1273a7d619b38e
SHA512d8df14eceee2d939dca1df83e50203aa862628b5139ae74eac2b5d8c6172d3cb23826868cf4622cd1527bc3d34171e111a3910f5f339ba08dff3f281bb5dccd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fb59edd1116c04457364b2ef0593924
SHA1874385e93ac42b0d31f43eade88d41b6d8817412
SHA25696abcfca898f1644d3a929312073b8d7709fc5b7506ffdee9c6e9f45a788e9f6
SHA512f4429abf7c8518f6f2012ecb91e16ce80919c607d3f40c8749071a81355be5a69a5741f5fdfabf17e1d83d6750f5bd9a84637ee0e2eeada55ecb0b1ac89300ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52568e64197b787954f1b8177c0a59180
SHA1bd1433bf71495be9b3c700f67d05484d21e83e88
SHA256b6d099cf0dc8b589352d2ab6a37096dbe2b1a866257780e72b6226d2acafd06e
SHA5129d3abe37a620bb95afce1c8680866f85efdf01c20a64be97332e14254abb553c822800512972c58dd16f8edde9ed4ef98236eadb9ea3d11836a1197370ea854f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffcdbbc0f6376d88496823fe157d98a2
SHA18c7a08de20c1e9454e0cfbdc0b46c00d146e50bc
SHA256156df05cb8febf8635ae423d80c4f9d6c41185895daa685c7901611d9e7b1bd6
SHA5129a53b8cf52154d9ea7e0ed7199d7ae8988989b2e670049c78f0f1c416a3566667b0d2634b71f432ce7b40a466df1a0cd79a57e5094e489d3973889c464f893a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5705ba5dbfb9dade88469138a5b67a0aa
SHA1ccb724219bd51471d165fdf6f39aa5ac2a829dee
SHA25624be15fb10ac72879fc5a41b03dfd88e15aac0317ffb29886fc50671363ca3c8
SHA512553416d1820ed300381bbd95a4d21312b1532882c53cceaffd731cbc556ea049f9998148947aed3e032f3f4ca314dd27a3446c92551a7c9025840af98c1df76a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3ce7102789edb5686afd7e3246049fd
SHA171078bb42b065f87e80ac3208c47915dc8f9d0a7
SHA256e7c2de5fe393f00fb27557ac7b9f0a8d4721a4f04c52c2bec04bcadf8029f976
SHA512423bf05fd6149914e999662c2f743a3580425669cf7722e07dffde42023ac8975d0a2fdd51ababc1a7107d9ff7cf0c3a760aa70424984080b38977adf2c0a78a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503d5f90adc8c186d7a12800862738e88
SHA18180569ab52f8cd44c745c341f7428a410c3ad26
SHA256ede6d69aaaf6d0d504d7afe8c9a6e4f8ce77e25f0fff1f488fb14889efd8f1f3
SHA5125f55582004a0f0b30931cac6d855cf9adefe507e92d8decebf0892a46a5aac625522cfa217f2d272a221c7015e63016383db8d0f284b24f442e310a1a2dc5924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50db2a8b77b2d57ecad990776ef8de2ff
SHA1994b17a5b6f04e9d043474e89fff9858bad35444
SHA256bfcd5bedb32e8d7c0c43d5c0dd61bcea37b11c33ae703b370168353335dc5d09
SHA5122dd4f038e50b588fd5cd51b447f8eb3b16df8a5c9d7ff2266eb21bd653d9de4cfc5738d6aeb71a9038476327da4a7b7b1dd4e84c1e2fd502c6734b865b1297a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579f853b7a47e12b5ad5e23dfeabaadd9
SHA1f780ad0ffd9d96eecdc9aafcedf125750b914795
SHA2568c99260345caf0db5e755461e8740b3578877541506c38850ea3e85437127879
SHA5122b9909f5cae66a4960dfbb3fc6b5a63763b5c4408e0abe9cf7cb78b8892bc0fd598b6401703b5c709d43bf05c459603217abe119ec9c65524943eff9e55e8b50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516b00a48a1632d43c5a844ccd6c2e64d
SHA157ffeb95a5b5c1233314f49fdd88fa1065b1c49c
SHA256561e0e0ebf0ae7625ae36e213dfe6eddbc51c79dd300b304bc99bc19fbf4c3d0
SHA51207384c2ae9e4bbf58f50bc9951922036b325010cbe8a22d22f37796e945c8dabee473d4bc8af972bf54ddcfa50ab91cd1c552739477444b35a881407bab1730a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586050c7747d872d1816c40dd35a19782
SHA118c26180270b3dec564e62dfa12a9c81821a5307
SHA256ca31a64893ea59997ebf6f44e6e38023cccee75e83f2d04e58993f4d552314dc
SHA512ab10fae68844446253069111e3497472b050e31756b413d2c72704bb757b3a0f44d484d1bf983daf7a92e9d4adfdcc100c575b440941bcfc1fc5657962f53c1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50589129bb04a07a79159671ab08683c1
SHA1ac80663c74e5aeefe57464a93c4ac65a3ba24f22
SHA256e528ea23928d589fbafcbe5051c513ebd0194047db179e45daa130b7bf36d174
SHA5126d7b4fda4d25c4f643e045d93b192317a5b946aa380604cf69e13aa339e2086803e4b56ff66620dd7ec66d0d8efb92fe3bef2e8ed6a6e06eca5d5cef9e85f1d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed11c9ebad043e3e8e3bede6025f10f4
SHA1153f08fd09610b798b028bd028b11f38c888c682
SHA2560c60c78fe8f5f84ebb5e435793e8723eaa0ef9ebf6103a5cf47280fcc58f7555
SHA512f1e3f6de1f5c30e75b9786c3c8cc7aa40b8779b3b01e21cdc3b4c4e5f6f3d71a17351dea3ee8e6472a1af06aa9d78011ca6085cdaf8d1139cf0c569612e3351e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b76ac240329e2daec1c2fb65c1e6155d
SHA1a292bdd4a34bc11c7efdea232c3f231a745e42df
SHA256b9aa0e53afeb3e80e391d6e3dcf076a6181f1019c6c24e9ce4abca19bb9c983c
SHA51259151039048f5679e29ea698166a128aefcd68c562c5dcdaf2d530709490f3dd00cc091abfcf13e3626a98aaa75763e05fa3805cbf1e8b77dcea567268cd6a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5775959a278bfe2c5e3778dfe5bc9b9
SHA1999c582bc6f63ea48da8029b1ce3e12afdb622bf
SHA2569dc437c785da2a7b63d81a77ade7c874262a386fa042b8b2dbcec590fe06a9c0
SHA51270b5978ed0f84e877100d23f235ca93468879ff1e666d2558e9e03d79cf7f060fa0dc84260377d942c0685e6e0194804ecd62c53697e357b3f0032ceec5f7410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdac3879e6e7bd4d21b86699904b6da8
SHA10a0cc1aec7f1734c75c677af43621c9fce371cf4
SHA256580fdbf69f93a8852fd1dac9184f3233af83ddd457478b6c5e3f52b20f5577d6
SHA512907aa4ae0074d964318b3d144082a1ec2085c8d79725a468eb35681509e0aae3eaf0ab2368549ed0411093a11c5151f6e5c050fd96f84a96302e69c6be826de0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545a108b2736cd295daa07bdbaf6eddd8
SHA1d67d5dcda9bd7930da013f7979d3619d6a98844b
SHA2565cacb9281f0417ad564481eb603117a85df29a8aafea1c7390bced157df9b38e
SHA512e417157d50b82740586b0bbae4068e8084bbb8acdd02f345538a87ef3b5f1dbbda6366b293652787ca5464a0529446e3554079925f0669089551361167e73d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2a004135e3b2a64fba307bbb2802a81
SHA1923072d0fd198dacecb8b6ce85c191d4e41cda33
SHA256b6d24045032cf1e7249fbee5fdc5941bdddf9967a07fc8a4f6b6c951247acc96
SHA51204345507d3ec9c04b0fa81398d716bb15aad41a5dc3042887b614520a1cd85369e529d4f7caf1b78fbebe7c814e0376faf005b5d27b0b6b3fd7a29767bb96592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53427955053a304e6d08042b308aa17ee
SHA1860d58e1e058bc0fb3a4901edd0a5d87b9c10f78
SHA256fda10a8845b03376df7b4f990d31900ad7529878fa23e7c5e2932b15a521b83f
SHA512a4ed39471a1f56370cf2f45e57b59aed6bca14d1e1e94fea9cc8602f15f1d1619e245df8ce17de6cd8d46767a929198efe110c0f604cf502a4f97d4411d2973d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b