Analysis
-
max time kernel
93s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
71ccdc7632c77e4b6232e77b525dcfe3_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
71ccdc7632c77e4b6232e77b525dcfe3_JaffaCakes118.exe
-
Size
252KB
-
MD5
71ccdc7632c77e4b6232e77b525dcfe3
-
SHA1
0b5017d8da53d5e1c34f3f1b765af854126368b0
-
SHA256
2bfa6ddcd7bca2cbbb04ac961e67636b1011cafb071584af6ca673d2852704ae
-
SHA512
035477ac3b5e621b470dd82116f9c03768fafb8f02389456259f6edefb70dd25210b7982552fe8400cdf8271e9d0f2164c2a3f3101008989f2b6c24d28c386d3
-
SSDEEP
6144:91OgDPdkBAFZWjadD4s1syQzRnYg6YW7dwhK+R8:91OgLda+syQzRnYJYO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3824 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 3824 setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9ABD881C-41D2-45DD-9167-C14A867749F7}\NoExplorer = "1" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9ABD881C-41D2-45DD-9167-C14A867749F7} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9ABD881C-41D2-45DD-9167-C14A867749F7} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9ABD881C-41D2-45DD-9167-C14A867749F7}\ = "wxDfast" setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71ccdc7632c77e4b6232e77b525dcfe3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x000700000002341d-23.dat nsis_installer_1 behavioral2/files/0x000700000002341d-23.dat nsis_installer_2 behavioral2/files/0x0007000000023432-80.dat nsis_installer_1 behavioral2/files/0x0007000000023432-80.dat nsis_installer_2 -
Modifies registry class 63 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ABD881C-41D2-45DD-9167-C14A867749F7}\InprocServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\ = "wxDfast" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ABD881C-41D2-45DD-9167-C14A867749F7}\VersionIndependentProgID\ = "bhoclass.bho" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ABD881C-41D2-45DD-9167-C14A867749F7}\ProgID setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ABD881C-41D2-45DD-9167-C14A867749F7}\Programmable setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\ = "Injector 1.0 Type Library" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID\ = "{9ABD881C-41D2-45DD-9167-C14A867749F7}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ABD881C-41D2-45DD-9167-C14A867749F7}\InprocServer32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ABD881C-41D2-45DD-9167-C14A867749F7}\ProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer\ = "bhoclass.bho.1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID\ = "{9ABD881C-41D2-45DD-9167-C14A867749F7}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ABD881C-41D2-45DD-9167-C14A867749F7} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ABD881C-41D2-45DD-9167-C14A867749F7}\InprocServer32\ = "C:\\ProgramData\\wxDfast\\bhoclass.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ABD881C-41D2-45DD-9167-C14A867749F7}\VersionIndependentProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS\ = "0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ABD881C-41D2-45DD-9167-C14A867749F7}\ = "wxDfast Class" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\ = "wxDfast" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ABD881C-41D2-45DD-9167-C14A867749F7}\InprocServer32\ThreadingModel = "Apartment" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR\ = "C:\\ProgramData\\wxDfast" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ABD881C-41D2-45DD-9167-C14A867749F7}\VersionIndependentProgID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ABD881C-41D2-45DD-9167-C14A867749F7} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32\ = "C:\\ProgramData\\wxDfast\\bhoclass.dll" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ABD881C-41D2-45DD-9167-C14A867749F7}\ProgID\ = "bhoclass.bho.1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ABD881C-41D2-45DD-9167-C14A867749F7}\Programmable setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2892 wrote to memory of 3824 2892 71ccdc7632c77e4b6232e77b525dcfe3_JaffaCakes118.exe 84 PID 2892 wrote to memory of 3824 2892 71ccdc7632c77e4b6232e77b525dcfe3_JaffaCakes118.exe 84 PID 2892 wrote to memory of 3824 2892 71ccdc7632c77e4b6232e77b525dcfe3_JaffaCakes118.exe 84 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{9ABD881C-41D2-45DD-9167-C14A867749F7} = "1" setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71ccdc7632c77e4b6232e77b525dcfe3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\71ccdc7632c77e4b6232e77b525dcfe3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\7zS8B29.tmp\setup.exe.\setup.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
- System policy modification
PID:3824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD545f32f2d141605cb66c95edee216ae77
SHA1e28c8e062cabc82ba63e4a42c24c8b0404df97be
SHA256f232d82b6513742e6740d8625aedc6f61472510f23098e257a8eefb481e8307b
SHA512e027b4bc7fa112cd8583e1e59828bbf376709ef1323da2dc01b8e10b613867ae95d3cfaba6f67b86b46cb2fac3fdee9c222a667427d0ffaac76da4a38a63a335
-
C:\Users\Admin\AppData\Local\Temp\7zS8B29.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5b9165e81934c746e3a33afc6bde86143
SHA1ce38f37d26d5fa6309f4d42cbf470bc4a884b100
SHA2563edbe3448cc74e7862db06fb08a8250c044a6aadbbea35a365560080eaaa3624
SHA512fab8731e561554bf3ac4a32950a4111d3bca7d9223727ed6eccca598777bd697606a11f658eae3d28f6dae16faf40fda7387d0e25cd8f3cb750c871f77178bc8
-
C:\Users\Admin\AppData\Local\Temp\7zS8B29.tmp\[email protected]\chrome.manifest
Filesize116B
MD5191f4dc6776363d2a1b699baf06e01dd
SHA19c3fe2dae92b9fc31cf7ead3c2731ac4cc8f1f68
SHA25688c4c5ccc51a2b8ad5acaa229fe821247a0d33eec238d71a752777c1fe3f2b4d
SHA5124bfa14d750ed343fc0c89802676e99237bdd0f3f14cea7e1acc3a7468e815aea3b5b0b5131f0a7a860e1dde7f940e3a27ca3384e5e0bf6893725a55a049c72fc
-
C:\Users\Admin\AppData\Local\Temp\7zS8B29.tmp\[email protected]\content\bg.js
Filesize8KB
MD5bff2062014f1931443180796a41a40be
SHA16688722f22b84998998e8de481cfa949ab513140
SHA256d93c56a9e357ddd282bc26e8dd08e79a9c9cff6565a6f0df3275db4210bf917a
SHA51217cdc198d3dcbd07e520fe2ae044f89a3250d4518623064de5a47cd04a1b23b494d6f7bd3debf3555018111c440c879470730bde0c56f78515f1d632585173d1
-
C:\Users\Admin\AppData\Local\Temp\7zS8B29.tmp\[email protected]\content\zy.xul
Filesize225B
MD5bc56d88e0b52caf9b064c70323cd1a36
SHA1aadfd6e705cd9bffa4e824e1fc255cd2aa9e031a
SHA2567f6e706b5189e34cd911b80382afd66a70d6a82e1b3864e7659fbcf95b059c20
SHA5126b32a9cca523132172d22c0202ec8fd7de2146b8a11db01fd140919302e4274ab0b818032c059eaef6412b5cbb5091566bbce7009db1720cf9116efb3c97cc38
-
C:\Users\Admin\AppData\Local\Temp\7zS8B29.tmp\[email protected]\install.rdf
Filesize714B
MD5b557b1b438b81a828c7fedd8aefa4a57
SHA175514ed10bc032932b8adc0c6205dc2eebf35e1a
SHA256b065dfd4ba688c3d7298ebdec6d34f31af6f29d8106bc613769536bd880668dd
SHA51254619c087175acbdbc374d893ca38c1d15bd5d7d12f391a3ac4a466eec189a07de6699fe34fc17ee86cb887419893fc4cca69faa42c3eae59a5774b3eae05411
-
Filesize
5KB
MD5abc8550908466a26026f568b1d878ce3
SHA14ea51acdeda4da54d5e0904d24508d6e21187892
SHA256ee3f97735146636c94f4ae7a2b557d1e25ffb290d6e85071cc357b10576746b2
SHA512cb65df5fa9a468807d64cd9f9be0370d8c4eab1681eaea4f370ee4d86859d6f31e6138c8b2b228136cd3aa9d4238e75a1572ac27e3a185835d88f0874dddc95d
-
Filesize
139KB
MD54b35f6c1f932f52fa9901fbc47b432df
SHA18e842bf068b04f36475a3bf86c5ea6a9839bbb5e
SHA2562b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196
SHA5128716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99
-
Filesize
385B
MD512e0bd16cfc735e8b3498ae89ded9e22
SHA1ec5cc0ea292a8c5a18dea5a38ce9c131a1a3c5bb
SHA25639deb376b2bbf9fedffceeb08834f4ef919a527bd803901aaf6a0d48c87854ca
SHA512604030a399b8b1c728f0f79c7d7e4ab5e728356af905ca70d822a1673d379ca9d508827189e8bd2705dacc2100b7cf75b7d7e85860c7277b4d622afe73b9d3a7
-
Filesize
3KB
MD5c249d54b318bdade47e31185cb9d1995
SHA19225788bf23bd9e3f8928d577a793f2bb1fef1b3
SHA2563f6f5ad889b90942fea390c54331b3b1ad6b0dc6fcc0955f959d783eb97e9371
SHA51217df4cd9283186fd10fd94531644fad42418129e40d0a577e861de5f16290748ee7f5d262bf9fb907db43f4be4bde25ea1fab1b71169934b2204b93192881e1c
-
Filesize
656B
MD53b5b19479894041e394692ff8ff41a3b
SHA18e32cedc8df9cb314ff90ad6453e3c3dbda0ace6
SHA25657782c69c7f8a0e2b0035641c90d0ca57e2cd1d1c24a2715b588695015fd5b39
SHA51209baf1d734d9c0ab07fa60c5e80ff8b84daa7b87afee622be1274e7472bd7b6ee66bc8494c435cbad85a07b2be65dcc59b7942f5a541d3e3450e4ec07e662792
-
Filesize
61KB
MD5cd2d40179a1bc21d4d07fdc2194f573d
SHA11a5ff868d8c09cb19d77f54d9e56d7873d48ce87
SHA2569a4cfa9c3eb0a5827c5a7571ebdea733890013381ac2e3914db43e9bf798240b
SHA5124cc2291ffde86f7732b70202a4eb60b22f6b38c4d134d194a122702c8b6a4a50726d0d9e86f6a4edc186e6819573eb9a5003e0eef1ab860cb79c4f378be072e3