Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
dfab51972f12594cdf84b436393eee0f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfab51972f12594cdf84b436393eee0f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dfab51972f12594cdf84b436393eee0f_JaffaCakes118.html
-
Size
69KB
-
MD5
dfab51972f12594cdf84b436393eee0f
-
SHA1
756d532a0ec14a953514899be0bc7608f26fa21b
-
SHA256
2ab2adcb0d10f6e188563aeaea31910d60e39bb24b6f1dac26bda959f655b5fe
-
SHA512
30835b6069949d71d013788561cfeb5e7db86839078b5a814efb8f2e6fd21930c217b981035edfa6967db8f6c848a7427f0dba50e78b5586005ede22b07d71be
-
SSDEEP
768:JiTgcMWR3sI2PDDnd0g6QQ0Zlol/aoTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQS:J7mWqDTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC2B59A1-7263-11EF-A02E-FA59FB4FA467} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000081e7dafe5173dcdc583a41a6b15258c1f4dd6b4ed937525fea24c58318e81ce5000000000e80000000020000200000004d86665739cb3f5035b275540fdcf6e2a24704b969d52d7fb827b697c19f2465200000009550167ad65de453f319e4072a0db27c5dc81c95bce4095681f1a66c827ecb364000000065aaf11c60fa6d33ff5c163538f6bb2e3020d18f2afeb4bbd13826b3c6f95afbfd139b8abec76a813ff83e00c6b31c133b81e4397f452a2a80c3f9c1043bd62b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432457736" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000002c4635cedbc4a3e40ffd0c820074138ca5d423651f69846c8a0e5430996f9b3b000000000e80000000020000200000009779e39c6ed4a55cfbeb3410fd334119eb9e0c8a9b1df179f046426ea8c142319000000060ea35be1813aaa5e8f4aaf8d9c426c8df73675617f35ce850029f2b663bb8c314785a967967c5e748182911ffc11a12f5db71543862c3f59b3f50ce3a8a26aba5a194b869c59cbff5a8ecd520c40dd76ef5e5081ea6363713e8ca9c22a445425d2ba70942d1fe86cd15ad125c21e1cdb4ae9f778611bb3288ba5846327297b1c1f07e42e8b9d3a6a17b7d4f47ac2be74000000046f641a9a6ee27926e18f56013418be09cce7a86c85208de9a35e032cce329f7103c3622cd210580a461ca727b030f9a3abd9e6be3f474a95cb804093133ad02 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506652b27006db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2496 iexplore.exe 2496 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 3000 2496 iexplore.exe 30 PID 2496 wrote to memory of 3000 2496 iexplore.exe 30 PID 2496 wrote to memory of 3000 2496 iexplore.exe 30 PID 2496 wrote to memory of 3000 2496 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dfab51972f12594cdf84b436393eee0f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bca6f6d41f8366611bc977544b9bd5d
SHA175c440d965ae52b25bd5ea0370afbd569e3bd523
SHA2560fb08d54919da70996d2ec40fd167d7c1822c8c640928f3ab11f5ed2ccd33f12
SHA512b1c820ad28163e6e6462a053c5aa72213f7a47929676799ecb63807ff908b0b8987bec33c9a30b7eef449e4b6d35494a4fdf3e3757665192dc6f7fa6a6cc2622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50152b26cffdcde8b0b16f10170efb1d5
SHA1abfb94e0505b93a4ea7e331083a0b124541959cf
SHA256b2fcb39f3cf2a6ae7eab659cc7c2c804e3813c2466d2be68471324e9d5c65c6b
SHA512a7d65fa511be347cf566a399abb5a1cef0494fe81190d08e4872e3db3ffd2efe2bfa610e24445abe7832e74ef1f9312a826720657e54eb9f737d8965ba13e409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dbe42f54d16ea6776e7b3c824985a80
SHA1588e2c834060643c67c824b200812f9acfe9bf08
SHA25697268f2aeb100b113364eac076072b55a0dee839d608c29d507edd637478a497
SHA512de6d06fdbbaa291f615fe9fa7bfee281b32e3e9f41022a68b336ce7de7df257ed1cea3dfdaf85bcad3432e72e5cb2cbb5eb23448d954d98a4f7fd1e861766900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5167180a756bcdaf926d196278d843be6
SHA1b430b831fd3edc2e021066740236464a082674e6
SHA2569dda2cf06fc714fcb791bdd1f71aed58fd1502879a3e3c56e341b4e564f0d7df
SHA5127089a2a6a467546f488fbea11bc3eb381de946893beb39a9840250238d77c3a7589c2de514bdf5c99694c780231de05b10d35962d3a028b537a5be80dbfaff9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5005620d069685ee5017bae3721d2ab94
SHA16df98c10902179d1e9b3a070715a7fd1057d92fa
SHA256fd4062836b8984dfb6c6f23d7acc3400f950258f67c31820c6477e89d25f0594
SHA51237d1f25e70a9f91caccf55569d889c411c7d8cc7efe35ebadfbfd994b9cc69dc194919d2b226bf4011dc0893a0206814463ea88fc54acbb12aab2470d62d7654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd7553bdcaaf97c6b6fe044f96b7ff7
SHA13d08be4a19e07c6dc000c92153698c7188a70a4e
SHA256aa6fb9bdd6eaef3c4284ba6a76a0a239a33635820d5553a18422832d17bf65be
SHA5122d1d60c858f739f121f175c3a7b1e8334f082606b6562275b73d74bcd669ffbd12e05d366a551c22847b7e19fe25e6bc16f07417dee96ff3edf27ff919637cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549deab257bd8accdcebb701914a49a94
SHA11b76367dbabdfa7f3abf65fcde80ec1f3a347de3
SHA25619b85d0b70b36e3be893b8f69bf31c4db9b6506f07e1afd242e1adc2354dae6c
SHA512e5d5992e689619ee20a967fef7db1b1deb407da7c4709513616122c720b5e0db967f4a218a1a65bf9ac63f72e6663e7098cfaad5d2a8ed5c800ff97341ffa440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b96aa4f043794d09ebfd928e0eb7eab5
SHA1a8f8166772d0e60e55e57b4255199cb952c6d6e3
SHA256734c238f4f358e1b1a23e5591c67b18f546e0304066ac47f144e1885744960b8
SHA5129adb8fb75a94893968a03c3b125e0686cfca1aa2633274320b66a22b746f2cba51bd3b158eb55c3ae7be4fa74490c646acfc848596a30228b32aee1afc43dddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4c0b1bb979564a0f8cbf02061a329e1
SHA1541941f94839237d0cb01e463d5d76e5621fab2b
SHA256e4d9e36a2fd6e1f1f1fc47ea8973510882637baff6801d92c461f2c467251fb2
SHA512b2b30c428d926082b8c327e4c953d126a22a9b409058a5be7dc7a1ff9c1b6581e5bfdc75c7088767e4864f73f74f4e8646b694390c6b7d95b02cf550b892bbfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50159d76fd52461fbcdef8352fe0785aa
SHA16e9032eddc75bb6f619e29efb16195b918e14076
SHA256af6e4f7db5254534a1d69d43b0de000717140bbb27f8688a817e27a557a9dfe1
SHA51242ce355397fe6dfce2634993bdd7589982b88b78e8b08f49c3035c4580671d10dd7d9b34f96018985b238bea30d586d1bcf0b87bac081e3f919c6e31d1b25966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5293b937a3e06d36ec863dc48e3dd979f
SHA18159017e6d1074b2e47fa8b4912b6fb2ce239f26
SHA2560b055d426a61be75fd88fec2131ad48ad02b9d88a1679872861a59f93d397ce9
SHA512d33c30b8dd2df85142108c66a4a17ebe957710cde5c70d9049fa2e441cf7cae68de991865e822c92a261a1c2e0ef79afe8afdc4e1acd68bc0a92c05c27b6a5a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aecc50cbc244e8220285bbb9cc33ef41
SHA1e068181c81180ff812b968f2cf227ad1454d64b7
SHA25680b35dbb9c7917951f19e7e5d20cefb1a1d6060163f36873bb284092057542a5
SHA512e3facbb8250b039991950a3e349e63dbdc85e2ed984c6fab2b79c4a2ec15008af3c739e15401288172225a1a42ec86e4b7d841d9431543ae1ab9a309d00769e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e4cf55c15108d5a541314a298419ca2
SHA1e0fdbd2fb6b3ad0d6cb1459f9282a09c0306045c
SHA256ac9862c930d0f9dba87aec777487462ea046eda40fc455975944e00ac71e5e1c
SHA512951965416633346a0769be1751c4f0d039bad7902fb9da412a89e80924eb675cc24d41690ee531231928f0ba74ff77dabc1ab98c88315b36c3977b3b96c0824f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5803d4a294bea7e0c14eccc523ca666a6
SHA1dcababce2a6c390b203679105a01b73f139c71fb
SHA256966a27076ea5c0537ef2cceaf6914451c03167e1f0573707eb7c26308a887b94
SHA5129fa5dbe7f1e85d38690b890e1d0a5d3b2f42a9ae5d6ada12244aa4c522cd5480f88f8d7bd1570ed5f07546246cf238569011d286b4f88ec1d138e4bbf89aa2be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a197a675a3eb0f4358587cbe1faf63c
SHA1c61b3725b218f305d6977d41a1ff22b45c2d41bf
SHA256003e8df92687c14ca3d77733e5a1d04ece6e9f8117047557625fd1f310fbbbc0
SHA51237ebb8114cf68a7fb2bfcfc61f2f17ac1c610899bbadc7cab1750bfcebf5d592cf039b108eb1913ffc39ea588cee5fff074128ca0c8c625e5fec668ce652cc19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c7349746ea61a1583dd63aed4c1e386
SHA1df0c33248460b315559209ecb153476eebe3c9ce
SHA256d7fd2618304c034425488fe2266799524b1e271ba8c6f341b9af866a866a6ddc
SHA5124a77179d039d4b3a22104009fc11a4ac3a1505472070e64fa3765b7c18f436a4b72c6b7337ede49fccb52cdd287d8a64a6420b2f851031280f0887320c74bb59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea453b89bd23c14686a429fbab200dcd
SHA1affb7d950eaed5bc63c7e8b73c1a0258100c9a5f
SHA25618e93fbf1d114c60ec900a5457d7c02d8c467e494879308cd007a9481f0af8db
SHA512b12b96f476e69ad311778c7880f53efeec42da37683ead96ce861e26a05ed7ba4b6caad48d9a9358db509b8eafa8e0cc70abb4a6c3d18b6fa99dcd33e5f95c96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507eafffa7d5d5789dc105cb04f70c0ed
SHA1a837de4fc8c596af00ac24520459d03a5eef7397
SHA256ba55ad9b4f7a06dbe548d86b1466b25ee2d78eff5e797cf6923993b07a868d73
SHA5127fdee0331ca8d38ab67a50f824d44ab0193f495793a7f56221195a8c28621a44439d70ccb81b26247d57bd0b5267831f52b1bae7b03cc08c7fd3825f92ca259d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505b3b8090991938d96fc4311cc4c9e13
SHA12ae0205cdc6695d0fab63b8759b93f66edf540ea
SHA256594b239a30e00e0cee6208c8f0352766beb532915b2d97ee293b3a718df17d5a
SHA512215961e8b14d7463a6f2fd879cd2ddf5543d5bcf2277ed687423c36cf963f177cbe9aca44e0d58999a42f662b74194c60a0b51ed7b5ad7cdeffd4a3ccfb5678b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b