Analysis
-
max time kernel
117s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 22:10
Static task
static1
Behavioral task
behavioral1
Sample
322aef96a4b5cb79b93ca9933be33b3d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
322aef96a4b5cb79b93ca9933be33b3d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
322aef96a4b5cb79b93ca9933be33b3d_JaffaCakes118.html
-
Size
53KB
-
MD5
322aef96a4b5cb79b93ca9933be33b3d
-
SHA1
a2d74a7216c3047462bda2db02b2f34ac4bdb2e3
-
SHA256
93f808639226e6a21a090be29e153ba35427e09046b6eb72719498416c6bda94
-
SHA512
042ec0f9bf738a94db3a1a3da88077c9337268cebc947dad8443a23f2642c543bcdfe1e6304f94de6239e721cf876bfe7ff30741811f51fc2631dcab4b01a83c
-
SSDEEP
1536:CkgUiIakTqGivi+PyUIrunlYQ63Nj+q5Vy0R0w2AzTICbb/ol/t9M/dNwIUTDmD1:CkgUiIakTqGivi+PyUIrunlYQ63Nj+q1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000e023640af8bde35281f003e44d715a291e6fd4ac0607f4915c03ad003b7222d7000000000e80000000020000200000004bf753624ad631ca2fe63a34182bac7e959d51575e0e35e479867607f56b86f7200000001f73472c395bcaf1c61d2c651ab4076767bbb4828bb2de35a57042c0c18a40074000000044bb38e4c9719fb6debd6703de2dc2a529e67c2d8b4f2a926b39428e52ea5831f06943eb430a633f69e80e37a33141365aa5d372cdb4a753a6bb26695fc24d2c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426727509" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701c23f952d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{223DC101-3E46-11EF-A0B9-DECC44E0FF92} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2920 1724 iexplore.exe 30 PID 1724 wrote to memory of 2920 1724 iexplore.exe 30 PID 1724 wrote to memory of 2920 1724 iexplore.exe 30 PID 1724 wrote to memory of 2920 1724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\322aef96a4b5cb79b93ca9933be33b3d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509e462836ed3b04c06b9695c77275193
SHA19ea1c0c9a23b6ac4efae1be6783ae1c3dfc65dc8
SHA2562422680c55bd4679937b5db37f691a1dfb855908af7fe63a3c1a323dcac16cdf
SHA512d33fd1510daf237230da5e8745fd067a2e504fbd1b686e5d75e40d3a3e836b33ddca2b613cdeafac5e7d86f48ac3685b5997d4ab5e274127954f3c560102b39d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55977bfdfe46e13aef08ceaf47783f1e6
SHA1258dd6d3910a0650b4f2f9673b6864c32a2e1087
SHA2566fc2490644b898a63cc636113bc855a5314b6f395a0050b780a91c13e59011b0
SHA512229e047d5e99de1591fa9f726497973a2457b4b6e45f3f8637f6707f999fb49cb3a2e7d0e8557e7abb9a2ec2be773b236c6069b7a0030b406a7c9346145c1a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e71cb3ec4ccfe444de9266c4dcce924
SHA1437ff2e5a139446430b9a989d835ff72345706d8
SHA2564bdcee26fcf206ec0741cc3229373e35b20d12f44e7c23d82db88791cf2bebbb
SHA5121bc44f36fda4085f49d18d7b3b4fd68bc1c7fbcfea2f7a0835663ee25d6eff0a169a070212b7f5d6a80f0577ba2d3fd7ed3170568ec0252aadcc33170565a455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c5b8043a5c5ac2a43fbb054e56242f0
SHA1bdef3600422affbd1fd47b26d04c03bfb7b8ce67
SHA25600c8e8ac72e7cce22a2927de0277f1c6630abcc9fdb76cb60399fda38a79c96d
SHA5123bdbe9874999795d509822c23a3e41284f19d319147d3fcb0c07c288bc602711a223af50536d4fab6f7fac083c16373f61d5aa8387a29f5f54658db9cd1cdb0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b14ca1f6518245286770cdbfdecbe434
SHA186f0f27bc114dcc6dfeaa9e358d8c92aa1dac871
SHA256968c7c7b6125ae6f76ae041808f932b00af93657ece191054460fcdaceb16290
SHA5127070bd2da9ba8219bd161ddbcd5163f32f9b1d9aef9d2c306f6367703d96c6b98edd57a45aa2a6c3988fa5886666c05ba8d32d33fafab3083ae69690d90e4d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d82859342ad138b33f37dc4c5de035ed
SHA15d883bb626ca3e03659a027f65dbd6968afeb9ad
SHA256ca37b0516ac2c8c5710039fbbd899f29b961c424fe9df7b20a59b8c617c8a032
SHA512207f8c890889da56fd19f0f50dabf41b7c7927c7ac2cfe0f73a0352354fec6a96c80836345145924d31182b6c6c45633a7c5581ee9e0660ddec44ed039e3053a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc748dbaa980f7be0fd07b9a619aa660
SHA131844bd825a136b03a64ce05a0a314e82c3d2381
SHA256af333c3b3d061dfa272cef262586569a47914021948bdbf9fec3bbfd89f8c252
SHA512ecdc2690f0bc05cbc6cbf671bd4253de2df217c429871a5fb0ee4fa5dfc3acaa5be855c0130aa51e5628494dab78f61e766ef6be68d8ffbf8f2de06760ff0366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593ad40fe8c86540d02092908cabb67d3
SHA1e4a766751389d57c2279f39c4619660076af1647
SHA256f547da3ca74d205ebafd4b54a50723c6887563753db2eea5ef6ebae3362b5e20
SHA51281769ac7c4ff67d00aa2f895ba7103a96e2024d66f6ea9b636c253205b0a881d218557936e877637b9ee76780011fb89403b5ba20f89e5b0f6604ebc2b5650a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a1648e00b850d65f1f3ca6912a1668e
SHA17a71d3750abe52462cfbe364441cf44b52df1761
SHA25689d6f0229c5923d2475ff72d504581c331e80b71f8f0a46669bbb5f89d67b72c
SHA51232226a1f8db75e6eb8c593ff6e11f5398d23249e66a4060ad2f337f07f7665b207699b797623b654f93abc7c646fd0875d9c535b54f4d5aa568c553225baa4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5028a1f983e692c4f133e063c9ddc9710
SHA18a3bbf52f7212a673acc1a690cda9eebf0f28215
SHA256232ff66859c1e625e19955d8956e5018fa2e128336335ecfba8286c069f23495
SHA51228d2731ecd5869de6de8a9377b1b411bff594ce00950e08c41c73f9d1979884740a7419ef86cb09ad2821e5d996c5d7abb34eb1d1b6cd0d6585e27685286e6ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8926029678883d5a69c244b46237b0f
SHA183e6c0d9e54e3e31d564ca3fb9ea5fc59c9c971f
SHA2565a5962c28a009bb2da749ba0e101fac3c00b255985f02e0fcfebf268e296b1d5
SHA5125c1c5f47c5b2407f25bf42fd36cac4d571f146d9e911b01d6231a828ed23bd3f59a0a534b4e10013d9b83624ddf9d7aff0686d3d169716fecd7342175c097bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5084518e89d662a1c5f34f1c7d9820262
SHA13e058eb860e99a2d6c6acadfa5239bee1117ee5f
SHA2567233e5038e7ba5e51356dd5bc4084cc9029cdf6a1f39fb12e004127fc4bf2ed1
SHA5121528bc754e3cd31be0e50fac44c1ff764ce921ac178cb4a381dc0064ff7845c4b582574a833ed59fd2714362d4f5ea11e6931e50dbfedde596e2c33b6112d373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2a91148b495dc915152984ab74d82e8
SHA199761daf95e81d56126541ae1d9050c9319ff457
SHA256bc1a6ea01424d3096594de6d38dc2d27788ff89d48d2a757362682ce204f1261
SHA51209d7779b5031a7b8f5e3f7e7304bd152443adf8164a62a67b73d3e5804b1ef83bded9ffd759418889e3501f8538d8654c57c37765528e20edd40a652915a9735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e08f6dba13a0a0e5ae28e9a2d7a974b8
SHA1298653715cfe70273978f727c63ffd30a3e6ace7
SHA2562881f15288574c11806d650a280a4584903267ea000e37e0603d32c79eda3023
SHA512156fd399f2a1470215e3552a631632197dbbd18e412d923d6628f0ddc5b3ffa20a1d3c42231aa8d06c6f75da613a5d85e97fa001655d72939f948357834ce79f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53efd9a5ee2676139335fa16bd5eb8a25
SHA10f748b6446fa7084f8dde9a55de2e82b6d4643a4
SHA2567a048121a9a92739efef4717c6e171e91bbf6fa45cf6e5b7c397b276cbe57300
SHA512c3a14164dbecdbd7261c3ad7d740e27fa65f4a2bdb3a3cdc13cb4343c332c2da3eff0c4590c10596ca7509afd81c9676d8a7f9b3ce3e988bb0f3ee30ff894a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f5db52be84d37d74445fe1db6b35c05
SHA116bd48fc9af2fd3bca1b201f89c477f98eb19eb2
SHA2569940de19e3ffe7ffde89d75f2004886b1478f331606233be1098e4bb8872c0a9
SHA512d601af751405ce2c2ef8ae4867b05c86531d42fd08d7aeec01121aa96ab9827f6883f36d42577c54eb9b94f1f4f52c688fb1976a4b051fcef5fe1efb3008077d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d49b3342ad4649f04e77791344e2f3e6
SHA1e77e13a01be4f4e1b9ff0bce901ddbf9cbad94d4
SHA25630cd406cb8a83b55f31de2e7b0dc729ff174d4c45370dfea06823251e3a84bc3
SHA512c0243bf7cbfc0f9810d9192ae2443e3823ce97dcb6b558656f00133f30bb9fcb28e4fc7790add70646bb03db40df97e419eae8b37e17eb33b793fe8092694007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5219578719eb85b4d282b9e2443e978e2
SHA1a63201fda7d4bba2f761e21928445d458317b132
SHA256ee54a9bccab90f011fb0d42c9f964510442095d62ed72873caab29e5eb150f14
SHA512c4f8fffff8552cf559d310d73673daba0485ffe251309ace19c8c3c43cd627d31b0f63392a2138b89d207366793aefbcffad458f886805c8138f67e552e25169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52735f2411b251b16a2879275d21c5442
SHA177402e932050bdfe81305965c347bd90fc3ec5f6
SHA256863a5cbce4a23c817a6a6e83e2709db0ab8ffdcd7a65fd616a9a215c4cad2564
SHA51242febcb6b32040e01e6bf20cf2c5cad0845c5a7d1c1baa3dc0349178ea6643ccc32189761c40993146ed784ff69537c5571ac79d047c3cfe5e4ccc7cde1fb9dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528b3d09058dc9ee6587ca54e7f730a06
SHA1d6612124914f3bbff7db60e93d6433f21edd4975
SHA256cc0ba539f6af97ce57092c03f139b310419d8e86e646b8923637f72a1567dce1
SHA512fad314ed17b59003a1973bc46105458d86db720e94106e830e2498a66844c3f87739bbb615655597eece9e96d1be26eb113d5fe274993d9b8bcc74196958fc50
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X761FPIN\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b