Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 10:41
Static task
static1
Behavioral task
behavioral1
Sample
38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe
-
Size
417KB
-
MD5
38c7b3a1e607aed753b35b78a105b029
-
SHA1
c3a2d3d83fb4e29c03e6cc5c34a53ae34cc792d1
-
SHA256
af1bbb21e8744b9572c291304b98064e9842572d92bb67d4e4e3c9ffdf07781e
-
SHA512
78df751971b3b28c7180ee80024c727adbfd50a500043a95dc1723d7e4866f19722207af9d9bd663c2a4d3424dcb0799082fb3284c1e813ee0fd1e4ec86ce8d4
-
SSDEEP
12288:Dr1WiLwWEaCmqp43s39OHCkM4ch8eLZDPK6w:9WOt2mL3s3gbMoi1w
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts b55d.exe -
Executes dropped EXE 3 IoCs
pid Process 2848 b55d.exe 4716 b55d.exe 2664 b55d.exe -
Loads dropped DLL 33 IoCs
pid Process 5012 regsvr32.exe 2664 b55d.exe 1196 rundll32.exe 3748 rundll32.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe 2664 b55d.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FE2C6476-6830-4483-A376-6058781C7154} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FE2C6476-6830-4483-A376-6058781C7154}\ = "Microsoft User" regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 b55d.exe File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\c6cb.dll 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\36ud.exe 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\c35s.dll 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\b55d.exe 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\353r.dlltmp 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\4b3o.dll 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File created C:\Windows\SysWOW64\2f11 rundll32.exe File opened for modification C:\Windows\SysWOW64\b3rc.exe 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\c6cb.dlltmp 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\353r.dll 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\b33d.exe 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\3ce8.dll 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\4bl4.dll 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\46be.dll 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\4bl4.dlltmp 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\bba6.dll 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\4b3o.dlltmp 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File created C:\Windows\SysWOW64\-4912163-94 rundll32.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\d48d.exe 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\480.exe 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\0acu.bmp 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\80au.bmp 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\b3cd.exe 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\d48.flv 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\80a.bmp 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File created C:\Windows\Tasks\ms.job 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\3cdd.flv 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\480d.exe 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\d48d.flv 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\b5b3.bmp 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\436b.flv 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe -
Modifies registry class 47 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\TypeLib\ = "{D9C916B1-7134-40E1-91AC-6932C6960A6B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\TypeLib\ = "{D9C916B1-7134-40E1-91AC-6932C6960A6B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CurVer\ = "BHO.FunPlayer.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CLSID\ = "{FE2C6476-6830-4483-A376-6058781C7154}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\ = "CFunPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\VersionIndependentProgID\ = "BHO.FunPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\InprocServer32\ = "C:\\Windows\\SysWow64\\4b3o.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\ = "IFunPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\4b3o.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\AppID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\ProgID\ = "BHO.FunPlayer.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\TypeLib\ = "{D9C916B1-7134-40E1-91AC-6932C6960A6B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\ = "CFunPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E533193D-2170-41A4-86D7-E4822455F193} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\ = "IFunPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\ = "CFunPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E533193D-2170-41A4-86D7-E4822455F193} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\CLSID\ = "{FE2C6476-6830-4483-A376-6058781C7154}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B}\1.0\ = "BHO 1.0 Type Library" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2664 b55d.exe 2664 b55d.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 808 wrote to memory of 900 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 86 PID 808 wrote to memory of 900 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 86 PID 808 wrote to memory of 900 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 86 PID 808 wrote to memory of 4764 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 87 PID 808 wrote to memory of 4764 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 87 PID 808 wrote to memory of 4764 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 87 PID 808 wrote to memory of 2292 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 88 PID 808 wrote to memory of 2292 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 88 PID 808 wrote to memory of 2292 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 88 PID 808 wrote to memory of 4504 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 89 PID 808 wrote to memory of 4504 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 89 PID 808 wrote to memory of 4504 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 89 PID 808 wrote to memory of 5012 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 90 PID 808 wrote to memory of 5012 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 90 PID 808 wrote to memory of 5012 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 90 PID 808 wrote to memory of 2848 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 91 PID 808 wrote to memory of 2848 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 91 PID 808 wrote to memory of 2848 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 91 PID 808 wrote to memory of 4716 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 93 PID 808 wrote to memory of 4716 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 93 PID 808 wrote to memory of 4716 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 93 PID 808 wrote to memory of 1196 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 96 PID 808 wrote to memory of 1196 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 96 PID 808 wrote to memory of 1196 808 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 96 PID 2664 wrote to memory of 3748 2664 b55d.exe 97 PID 2664 wrote to memory of 3748 2664 b55d.exe 97 PID 2664 wrote to memory of 3748 2664 b55d.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4bl4.dll"2⤵PID:900
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\c6cb.dll"2⤵PID:4764
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\353r.dll"2⤵PID:2292
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4b3o.dll"2⤵PID:4504
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Windows\system32\4b3o.dll"2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:5012
-
-
C:\Windows\SysWOW64\b55d.exeC:\Windows\system32\b55d.exe -i2⤵
- Executes dropped EXE
PID:2848
-
-
C:\Windows\SysWOW64\b55d.exeC:\Windows\system32\b55d.exe -s2⤵
- Executes dropped EXE
PID:4716
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32\46be.dll, Always2⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:1196
-
-
C:\Windows\SysWOW64\b55d.exeC:\Windows\SysWOW64\b55d.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32\46be.dll,Always2⤵
- Loads dropped DLL
PID:3748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD5a8c17915515ea7d26852814cd4f18946
SHA114cde710334cf2b3b13e7128a7b7dd9b7c39eca7
SHA25638a38dccf6784159a3decb554180e9f898859d5968a5f01bf9b5810e54d10be6
SHA5120ae5cf9b63ff22c8f86558ec89727d8b0a52364d966970006b1688743f0800b873e67177a5d02a22ec583f9a2b4e47c90563005e40b753039a1b9d1cbe8a0793
-
Filesize
57KB
MD51c0cc378fdfc5ec08ccf619b3ccfa0ee
SHA140b85151bc6defa5a0e9a9279098bde3045b3a17
SHA256d8476b8ef4af854ae3fc32d464df734cc7fa72fa38b19f5c91ca0a8bc93ed11f
SHA512b3ca68fe54ac2a9592398c8d7860f1fd627fb959abdcdfe77b23050e87fcee5f223b26793106526ded35bdb1a21589448ec52a056207994dc227429ab133d7dd
-
Filesize
255KB
MD5cdc6c3b22ecabb875549dc6d7489e09d
SHA18dfc2087a7e045bc1de4be92d6ba15b04bcec952
SHA2566bd70c5711b39316d7d92f1704d21a26e314a3c063e0df13921f73a2334b9f3c
SHA5129c164abd44b636ad267d1f5b1a49c07631e8b0c734c90dbe753b15b43db01021980d4a046914f8a3a0339eaeb33b9d4271095f20174d7d0d6a3b5bc09eaaa873