Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 19:26
Static task
static1
Behavioral task
behavioral1
Sample
dec1165ad01c5f095187be38b4783bfe_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dec1165ad01c5f095187be38b4783bfe_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dec1165ad01c5f095187be38b4783bfe_JaffaCakes118.html
-
Size
4KB
-
MD5
dec1165ad01c5f095187be38b4783bfe
-
SHA1
d2566ac0428abbb505754287b037abd0f8486df9
-
SHA256
11cf593334b8d9a6540f85275f0c99b429d6f66818bdea30e9c3729c66ea05d3
-
SHA512
c3c3d4105f5528f07e647ab3f6fc715bec56a4ab64c0abe5a9241bd8d63c561b909ae62dd2767271a948bd3e9cd7f5020cab072f4065e24e3c035d918ed64dd8
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ouv95b/d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000ee526b713596c384ca61ab49e19f5ca1f5b8fce0a5580d4c64afe6cc61a1fe76000000000e8000000002000020000000ae242d8a98b98812b53f5796ee121415708afbcae682df75934035eb21f73a43900000002db8fcaf6585985a2775321560e7a3c816ff38bc2b88688c43606e42362d26126b88b9792380efbdcd4f02818bdb4840eda8a61854c87845ff434485b6166432c89df14318f3f992b946e077fe53254fcc33e75367fa6dc140d979c36cd806e4e2664e6fc7ec6d1756853a58d0936f3ca9a79107222db6d0e2bc558d2a358e58895a61019c3d1efddf680e225c40ffab40000000038a9908ebb7d3853983ea796b88aa5e5e71e849a6a53faba4823b4aeab48d3e1d82407fa13c449fde00a350ea962686504c91d1b3711e330feeae3f5ec79656 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432417461" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15472101-7206-11EF-A742-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000fb12fab9de930c2b56b889f9f898b7654bb686b624b3594bcc42db07d5b43f08000000000e8000000002000020000000bd12b1da116e9336521ebbbcc6fd71a1f431848fd83462bc3435cb7b932a25fe20000000b95807a10b85d02421ddfffc080e56efc26956a3b667f225ccfd01bbd748e2b040000000f9bff59a6bcc98217fe22d26dbd8c4e38580cb2d5cef01b81d9384ee316d00e4919783a09acaabea63c54c6c3dc39f8c9618581cc0a40c6d222611caa6b4bf3e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9004dce91206db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1876 iexplore.exe 1876 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2816 1876 iexplore.exe 30 PID 1876 wrote to memory of 2816 1876 iexplore.exe 30 PID 1876 wrote to memory of 2816 1876 iexplore.exe 30 PID 1876 wrote to memory of 2816 1876 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dec1165ad01c5f095187be38b4783bfe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd2df516f1e5fba2e8e1dbe75a0ea9fa
SHA16ec18734a34b2a635185a96befd6146ea5409a71
SHA2563d62e2ee5d3b5861e7c4fce7559e18834b64db91693fdd5157047dee71b6d5c1
SHA512701e08bbb1027441eb3187e2b44afc9e10922168e3cec1b27f1632d914553fc2f2408e89b0d1bc3031cdfb6d1a23a0b2028cab0c21540ae174f0d28fde12b467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589fa34f1c19c007e3a6adb6f741b861d
SHA1b685f47788d6c280390c19581db6bf243fd3ec8e
SHA2563501945abc3c9949c9088abfb546f8129f8d568d2a4e8a89a9c10669cf13397c
SHA512f32ad75882b948bd143351ab2cb4f09c3529752b8706966f717be749f9baf85d4d4f4c82c2c39ea49e1b041b7816766226116962f0ddbd5ac0c807b2d6a00834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595d6f7d0e68860573e42b368b523914c
SHA157a9feb6e69de5b1eee8300da480900bd9743902
SHA256d65ae4d3361bac54051b2b84321272222e364bf63a6514909799b4ea43735112
SHA51289741786cd562c9afc8f8e92cbba5ef87b4452826cc67d6e319225ab6e03620cd0b78fc5f052f687c5d1acc656702ecb8493569feed0454863f6efa406dc4946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ad0d81b6469f6d2c3e6f01185c98f18
SHA1f2cf35257c33bdabb38d2915409bba2ed330e4a8
SHA2565c6d2520a6a3b599611d02a0897f84febb646a0e5e0a5185043e010bc111dd10
SHA51219b2731dce3b57c99622aea9f4338a79fb8a744df213b12905f7ad9f5100945c8805ec84aacbfc43d4c95ce9b2ed49228e9c13b860dc3d53a350780d45f7ac59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b5df336822633213993dba306c017a
SHA11bf19fd685a4987537acb771cfb8435d8db8ee55
SHA2562cbf714678cfc467ea634558fdd326f5bd7335e311d9bc1848305bc6dc943f95
SHA5129a7d14770a2a1e249cac66a08fd8c164c74bcdd8d430a994e8245a973b9d9f8d6cba2ba96111df2998cffe9e8cbdb7d304e72e2d986bda71f86fdb319f997b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6d4307f1de10098a60194b2c0e882d1
SHA1fbd03655f9b7fac5db9f36260629713cffa0d58e
SHA2563dea815fe6ba6ef1c077b6f3d69b5a6b2fb955935b214a3c839d2470e9f0da5c
SHA512d289ecb1b66c6cd815cc1b58b8ebf7e098064cc9a2756418756b47ac117703a60124ebd2f0ab66b09addee78f2abc3c1b7fb8de15db201dceaad41aed10e34ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eab9a6a4108e2ad0c9317884d253ee3
SHA1e5bf18f794bdb372e5b53b7136b8402bdff7f0b3
SHA2564d53b0f08a58e453860cabde432651c371e89b3a39a43858a49c4d21d745377f
SHA5123249dcafd017365cad624364efdd3318c89baacb827260294b95ecba4ad68b7efff960f6351b2d52322e87d9fd3699e7af35c51740a6c40ef3e990e8df22af89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcd34b8fdf890017586083cbb7068490
SHA1181673e3cf6f761e80191cc28817eb0668b6cf72
SHA2567341abacd6f7e7e0f6f1d662fbae911b76f5dc6f87f3ee6a9a76d097d6e44a0e
SHA51248e79cd5a3a65340e7dcf0e61a0ad577a8f113234956159aaac47f2dbee17aa2f115774321d480aa45b0822521c3284d921169c342a884733330b1b57694581b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5085285b103aab8e3364774244dfc0ed0
SHA1606b1c9260554344efe4b0ddece9f0d2df50426f
SHA256d20ee953e27b2e4ac4d8845ab65023a2c2d7d24517da32423d36819d7d692d84
SHA512733322ed295ce08b0d56756dd9ed254566ac2545f368d1c0f3c2527d527b55b52862a09d7a7209395fb13ea739fa9c58aff82d08f6bbd0f9aa5ef46f2134995c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feeb1adcecec9796bce3677084d51bd1
SHA1d296516ba7db131e40f13c8cccb4ddd87c415b03
SHA256ae900d7801e25af8a31233aef425abe105939b67cc7a11d245529196d1b24e1e
SHA512723640a06e40fbf4182783f9cf1029c16da45e8bb23ac8ede08343a5b0d5d138c286f919cdcfaf169bce616fd12e1733043fead41bbdb7faf737e362ba6e7079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee19a6b3ea52fba2aef06803945f876
SHA160df031a954cb2a38645eeffd2c5f9a2ea94315a
SHA256918678d9896a3f4a3f74e9cd3431e0466249ad5b678baf7f98d6ee76725da893
SHA51298017bf5d12c8d20048c4340e0553b46f8f1ff3f8e6b096de66187dda7306221f3fa57d13c565e5d23f6afcda21e92478388af5d1d2a747f699ea77e9cdb6bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59803240ae05f706b09c47f3f7b89744e
SHA1457f383636705cbf29dd64bd778b1237d000f073
SHA256983b09a5b849c0ae8cab5e1de8f4c4577cc8ddbc4b94d0d14df13c118b6f9b4f
SHA5124548137dc8873f1ff8f20f9b7a12c20c35e11d33115c0820fb75630d8a772e3c534573ecb512fb7c2dbec552de0727aa3cd509fd561b5bc4014fb04a09ddc38c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5bea5e284915570e19b290fc7f4ca28
SHA16665f69969c3980cff6437a171cab845124e4d9b
SHA256057f940492201b0ce947d84c08f6842a140b090baa31e4b4cb4cef18e7aad53f
SHA512c47611dabb16e1bc6c6a402321b35e7a107cf2750db656691781b34b9560d00ebbcee779ca1063b13972875526b33d3caf1fd40caa425df50e73926f8c21dd77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a783264277d01bf45f1ad5d7bc1e12
SHA1557f25637a07caf5423236d0fc0ae5b92544421d
SHA256418f90f8e9d5718e8a3bf40ee9963e04b0c155132d582280cd43e6f858c2a51d
SHA512037ccc64ad3a8b76c860cba178236cb17110ba0f96ea86484ccedf92e9a8453d2c781ddfed27720a241aa0842432cbdd368c0f9ea7ac090d1a397d832c4a0f73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50671350a2228c6960a2d579e0316bb49
SHA1b7070cc0cb5ce92f632fd1ca9b358d4d4a8336b4
SHA2569e7c4532a950f59a3f5c74d4fe6f14afb6001e3994b294da17012aada1091860
SHA512f02df70bc330d9c18741b035d7d8e8a659b0dd05b0ba4c1045adc0184e1d59fec98687bc533464ae006d1960ab053cc94c9d3b6dd985c773f95c06864b012e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abd31965b457887fc5e62f2660a3e169
SHA1d6d749b6575c81e361e41d6e5256ee064339f18c
SHA256c4c02efec5ecdba2c4d3538d5041d7c5c1c11494710c47ef6d0a30faf87f1161
SHA5124f17bfeef7422447ad53128291425b85626cf47e74fbaaa03b6f7e108e203ea9ff66aef5600960650b7ed1d28f9a31e2afdd0c84f504bd492d235ed4df1b7731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50473dac5b7909bd8a4becc2e595cbd1b
SHA1d62f5695aa435a2cca688f14eee50e57b34d916f
SHA256289cbc7cdcf46c33d8de11229452b3130c6712e386985b10a5223d168d863a68
SHA512459221f65983933f166485f2e673da303326d3ad9c6dd061c9ab51cc36633c85ed9d73218a8cbdf7dc034b834aef1395e43a868dd04fd910bde328d2d01e597c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfb44541ae74ecb0508b08cdb389078c
SHA1b17ffecb191e9523b0815591b3c7ac070e40fce8
SHA256aadda41a7ab5ea225c313095d19e6c61e870033ffe57a437ce684fd76124c8ef
SHA512b040427c5fc96cb4d67332a4e789d83cfc55ddab6c4eabec5765d70d97c18f8e28fcf3df076bc81f85f82cc19bafc574a875814e0b84edd3ecf3e7a4b76cb9e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b8f20a36495627bd5cd83e87780ec6b
SHA17cf1ae961f90e80886aefbe98e9ca2631301a1ea
SHA25604969ec1fbf8b80a420034b7228942604d1523ae48bd5d8968e1347145ca15ab
SHA51231ed7ceab30e3d34c51c11f9a554cf0ab8b98caa07b31265539da9b88eea871ec341e2a470eee6cc9d82b06da3b2efb1d61c409bf15624a33454b29b3a0d676d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b