Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 06:39
Static task
static1
Behavioral task
behavioral1
Sample
fdfb603b2308a9b90f212c26c44388ce_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdfb603b2308a9b90f212c26c44388ce_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
fdfb603b2308a9b90f212c26c44388ce_JaffaCakes118.html
-
Size
12KB
-
MD5
fdfb603b2308a9b90f212c26c44388ce
-
SHA1
1c888a891d6d5d8a2851f2f81bc890974011cb6c
-
SHA256
97135661996b14a66d51b778a1c62c8c08f37134d9bcf54389bc6b0e68aa06da
-
SHA512
990a61f6b235f0249cc4e4dc88928f9aff2be9e6e4ceae45ff830b28aa779a35d1ce522ab9e195c5b1c3f29d8925687bfb4acea1fbb382e7c9a3a52b9006d4a0
-
SSDEEP
384:Oy4y4eUm2PCoyG3DsQexavq6PtAT14ZaKYXho:Oy4VeUmVnCoQexNItAT14ZN1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1038e4773a12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A37533D1-7E2D-11EF-94CC-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433753862" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000f89ef42b082d6264589263f8518aeccc344436cf280df6825540615f2d47c722000000000e8000000002000020000000b77000fecc37aa02bf71431df096965ccd32570cd5d47431822542a7bb4108e720000000d4519a7e577de55344a21358e3d5b3856dfc607bd5af70c04df5797f1797b00940000000ef97e1d32a27993cd3bbff1e2047561a339249b6f3df1e4dd66dae3ac84d6fe1d755f17d865c1dcf4bb9dc66abf7580dbb79f8d355a9dfac3896eff21288d417 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2056 iexplore.exe 2056 iexplore.exe 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 1732 2056 iexplore.exe 30 PID 2056 wrote to memory of 1732 2056 iexplore.exe 30 PID 2056 wrote to memory of 1732 2056 iexplore.exe 30 PID 2056 wrote to memory of 1732 2056 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fdfb603b2308a9b90f212c26c44388ce_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573897804542caf30c244773e00e3d740
SHA1fbcb0c6ebdebfccd72f3223bd1d11916c9be2c79
SHA25685d3317676a1f76d46eb2cdeb5ccb223d659be788111677aed8554dfc67c4408
SHA5126a118d9360eb6e7db4a87eb1680398731d43e1453384a49518a9b006bccdbcbcff146c566fa04cada54cc2655b2d673444ad862b2fbf743790ecadbf14c4929c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d8ba71f8035cc01ac34ca74eb5b5d5e
SHA178e7b8b0ea902b49535c67fd276d4546e31e8f42
SHA2561baf67b59ddf5434067e769cd90ad16095c6419d53761e57f46dfe2784d4da4c
SHA51242c6b4d2f7587b354893bb871a315f22692a31315ab81f58de343388fa5d7022236fd1faa877f5415af0b2981c17871d0902fa71c556050ee9450592bef7fa39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549b25787f9a7454351d7a8ca0b123399
SHA15360d76d72de7b325f11e9b98424592f7310c768
SHA2569f39f53a0038c28c420407ca5334bb25a85ace5b3e2574214db67ee19be82a9e
SHA512c17607d11f61256faf99a8b604dc17e49ac335d3bc960cde60d65025777c411c195a7e14fddef34f10614f717b2ec5843e7079f7859a14d133dc7a1d3af57324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515f7c808a703f06d852c8dce5d43efac
SHA1a62dc0b3f62ced8a005ee155e15f781bd1a8ec83
SHA25657ce12db08ac18b4322a3c6d351cee45ec661dcae00078736b629c280502ae99
SHA512819ac3537ecac8b688828fd730c22c8d4b1b98c392f2da0f15779d07808dcf0aeddd7ce38e32fe6f653fdb3e13f6af804335a87d46835b8aeb9c5b549fb3368a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539ed6fe75542f836b0d2add3b2d3cdb6
SHA12b04317ce6b00a227c1f50f8cd75d49823fd4ccc
SHA2562e9ccdfce6a241ffc287b14ccb178fe9628791cda0e6634ad0251b8fa502b68c
SHA5126816d09674875245c56e7d796cec6a2838ed6201f7e4fd6568dc0ed032cf1b41257dcef9c9ac1aa53ec15304b293373f134769411ff1f35d8814fd6c3e0e17a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b9425b89481a18c0f0a9f42cdc3c3c6
SHA1ef3c52894346a6b52ddd00193d5c9261ebc62a9f
SHA256b6fcdad04a1914c57f436f5d752e0b65361933afd079bd8cec2249eaeeb68c9a
SHA5120d8871f022c84fd1e7769498bcfbe5ddd61bba8670dc015401fc512538718d0d223d39c61d68c976166bd2f4ad34e3990b624c7acf07d98108e540afe738856d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd80f0d1ab0468a56f58c4080ea748b6
SHA178a51fdb71ea2ddd54c25e6102d5c1dc368e1a6d
SHA2567c30010d6e57e321758a06521f14d02a41eded9b15e0d817e86cce2a545324f4
SHA512772e126dfeadb92c637e75193cc7804ed7b77eb7e11b36d916b0e872d1b0bfe75c44b5862de069d50f7ec09c98ca50e574af2203b55db340a7853d0053eeb64f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a51feb7e4dee7b39da04540127ac41e6
SHA114df3dc5ed54957b675f42daca5eddf09de730bb
SHA256cde147366f6e912da194085b1687348b55d6e4875fd8fb400983e803510f742d
SHA512a50ff6dd2dd319e5406f9070b9b3f91efd7597b7cab70856e8c4f0f44869fc201349a4a5207f5a7753fb2c7bb156a6a67b272a0c4ca917717962f9f25e7d4881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53601c14b64b638df54fdf9948ce88f4c
SHA11df275bfc3744675de9302537d537b5ecc09cf2e
SHA2562d2bc482201dd75ad1e11a72066cd4e24d9dce5bebb3b7936ae1d59a36027f88
SHA512992947279eaff93c4d97f689d528822c34320a7cd51add63cd8c75d6ef920cb0287117ff41f15cf24f705433da8d1d858a4a07ca0575803bc28c72fd3db2db25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56781124c9196c7e60155b83a21d87717
SHA10f716ae02e039d2bb3e91c17047e8143e927e4f9
SHA256d542981d79fc201a3d76306d2641b4959b580fe1934c65ae881f9af6941e3fdf
SHA51247bc4c0fbc53a0947d6a4a931fb96b05935b3e9ae1ae3b5f8c278cbf1140e86985e5fa557d51e0cce8785cab4615f3c9c4e27be4f5e3a206f2a40e038ed7b0fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2013a107eb37d4bde4276e384074e32
SHA11627769f29c7d05adbc47595d609999ed0c544e6
SHA2564de70c4ab5ddaa17daf00a6e9254c1db0a52475ea5381d687b16a0603708d55e
SHA5128ee9defab1c4d1f9db9333e072fab3074da48c93ce19ba1029a9858b3d2fe345e366fced762a5584d4425fb2347c1d32886984bac47e43224959c2a1f1670372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5489091a9da9e369e9d01dc4d81625c29
SHA18676dc72289edf79b774326a6bd0ffb3f1cf650e
SHA256d43bedce1060d82b7a3954cd7b61e24ab032cafd4a82c7abc8dc27ad7cf1efdf
SHA51291b0495d0fba59dd96c2b98b8cae1788a2aeb40fbffdf105d7e9fd57b5c7260faab144d5d9f76c24890303a3a52820c9e821376c617dcc4611baf2007e14b2e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5715f88307f9f91e65f04a63b568a7100
SHA1b94cfa5b92234126740bb8c20e678b71a058b4ec
SHA256fce07b9696f330193a659e18ce334763932781634b97147d867758cc4960124a
SHA51207c1135050e749a1dbc8f68aca3c2f416d859481e22996a0e854544086de3edeb459496e789031776deb76591e766140b04239c6dd43f070b3a0ed3c50a74f86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57033fb5adf9b40fc77a75360a8158447
SHA15dae2363923b17d82758e52e77c759d24ca2a968
SHA256b7c268351c89a761d81ce854e569d9b8b9d346e9f80355ca9008f908c315b937
SHA5129be8b949e7bc779cc0b2b5d14105ff871f82941cfca962bb759ce2a8873bcbf950f11c93affe7dfdac6445ff212f6d141128e6803c081d91a0d8be7dc70c8f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7afc8906a2abaca28b596b95f1251e3
SHA1dfc6ee61d66ac8f2a169b647d05919c50b3929ff
SHA2563de7dc05b44021ebda5c9ba0e8c6eb7d288c03c1b13b28eac207f1d264a1536b
SHA51235d7b910478b54040fdbcb27cce666a08aeaaa2db58ebb26e94848b5ad8eceea134a0bd3cb4f850a204a28eb6f6679cd01f0141faf79f9743e466eb84c7ce97e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a51345cac5318bce02374d4f0a1c212
SHA1268f7f2bef272a35c7c63c8aab5ab465e75673c7
SHA2563f107f17a16686ef2f4f7748597cb6bdeb006801814b7984295856260a572219
SHA512fa0fb84663f483a9707c4699cdb4b4a3e77b092e33c3c676c34dd8aa52a85925a346dd6ff331e9c4e38753a55181a9800e1d8c9f0c4b03c3989c37bdade3f460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53be7d1910bed176838b9a700b9da39d2
SHA1973ff68faddb1580d0e4e82cc464619f11762cbe
SHA2562be76b458ca83a382a33a8eaa8ad11dcaef2944f694166c134907afe0749882d
SHA5128eea3819caadfaf7281589fd5c7d631f74e7071e2f57fb38d14dc3a9a4efea757bbd4169eeb71d3e5e30401252b6141da89416a8d0ddb91e29bf95c31201f301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5420d2e9b42fb4ea2c82a14b2f162db17
SHA16311b7c58703738c9cd6b44c4179a5e7b8317ebb
SHA25600bccdbb508411072f0b82caab10bd775c57cbf17c8e62533d02debeabdf8e0e
SHA5126789980ba246669cdb7ba94aced38e5de4b3946f7e71dbb73a8a6fef581429d59c0ac72cf5c42d60577d74483dde3b82edc530ab7cde4232252c9d599c211dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9f1b623b20487ca97ae5acbff784944
SHA1ed13591c8a222ea5911688fcfb526f0237e7807f
SHA256e274b18c2d58b632c4500d0aab7e2c004c60a535a4a9751c1619321a3aa4795c
SHA5125e24d3902cf76f10f6dec5f64813e19bb92e7e3e7b8bc2d65c4acbe11e618d08f42d17e2baef4ce59c99c9ed983e6be0337173787dfef735a2911535019b78cf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b