Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 16:16
Static task
static1
Behavioral task
behavioral1
Sample
067db25735ec97d273f8fe1f84fe97c7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
067db25735ec97d273f8fe1f84fe97c7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
067db25735ec97d273f8fe1f84fe97c7_JaffaCakes118.html
-
Size
138KB
-
MD5
067db25735ec97d273f8fe1f84fe97c7
-
SHA1
9a9d1a4296a3328888c8a7d0d0a18e81852daa2e
-
SHA256
5b515d9a340f7cb3e761baa6735a37f357739df2ea620a0dc175091cc6fc20a3
-
SHA512
8f8aa737969ba7d5a776ae84da3c593042e374cb792fab7f5b3b3322636943fbf7d94a48ac2b6eedeee8304d9723202978930747cf15efc08cd7a54ad93ee206
-
SSDEEP
1536:SVR57c8ylATyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:SV/xyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000496b2ef68d9b94259684c4f5a5bbdda8e9ce67e3417527afee9a342f82f11f7d000000000e80000000020000200000000c883447c4f7855798e272fd2b8e89079d0c65e81ea602af9de035370f4d6f9920000000801756be0be5d5081322e30ca943971dbe4126bb463a21c3f1c5ebf359401faa400000002dd20b65a39f160e0c6a2f1b78823e4f9160e632ef664b89ac8758bfd861f06097931b00839ac05062add69a6bb68bbddcf49332eae05970075f99752635fad0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433961239" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40dc48911d14db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7932B0E1-8010-11EF-A073-FA59FB4FA467} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2332 3000 iexplore.exe 30 PID 3000 wrote to memory of 2332 3000 iexplore.exe 30 PID 3000 wrote to memory of 2332 3000 iexplore.exe 30 PID 3000 wrote to memory of 2332 3000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\067db25735ec97d273f8fe1f84fe97c7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d151b7c7e14306c3fefc088cbeb9cb3
SHA12bd9430bee13198ab0db573a6e5fb7380fda96e8
SHA2567f07c6323ae52ef82b0cf543177406be32d606c78aeebf3fe4c6e27868098b2a
SHA5123842eca01bf9d450fae60130ef43b5dec41aba306838695823af4b4b38bbec6eb4782505ddc33f981edc6a857e1aee63bab7b86e6a524891572cc9a009553988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521622331c108601a839cc6d4d32bd36f
SHA180bd6ced812a80a965e785e0fa806516ba1b1f4c
SHA256b6f1edd78089c40dedce5fff209136a96befea12df56d6fa596be47999a033f6
SHA51255cb899d486757d34bf70e63d91fcebc12a6c579ee3947b4c80e40cd06b9ad722e9c1f5be329b1d370f45863b4794d7100f413f9b74f67dae4e80a7bec75dc58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d5d47b2e27a3d8403bf1589949892d
SHA1be209450d7d7511574730ee2dcc9de60fee23797
SHA2569b0d65b1beb2d9f9ec89d324dd540401335664520385f93df2280273b5ad598b
SHA512a0f8b8da97a9c0866f0068e6a8107bd33578278c9d1ab16f00f2396fcaeda654b7d7b84b0a20291d27b4aa9bf371ef80e78795f29d4358eea9faa86ef7f25ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53227a8975e59f82d89e91e4988f56b1c
SHA1b0edba69768b4d40b5928803896e5b6913909953
SHA2562d974114989dfc81683fdfb3a75aadef3fc089d9e468883028c327a98aa78e62
SHA5124a86f1e7b5ae4d9712495b55b9c7fa8e01e3f473097637302f9bef9a61a44ccea5c26a393f7269bac08784b44dbacca7604396dcd17da28e090f0d318939da59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55648e9a7236decd9f9c82cc03faf8d9f
SHA165947f374a1935569fb38069c76e714cf67dc966
SHA25669c32f13c30bfe06ba0c62f165026875a9fcbfc4e91930ce3849d049f872a9e8
SHA512223ae3fd4731e84c4457e56543da0f7ef9369f74d901787de231d411d6ce1b0e5a7d2a3fe7e40de206502765b5e3b475cc832df18bbb73e5f3438cfcc493bad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513bf61bb09813089fad584711f20961a
SHA1d39040139d42a5eafef4670ee15411fda89a8bcd
SHA256a87f7cef5212ac52ef123b4520f352542c4089ab83e1c5cb4dfda719d4e2808d
SHA5123c2954f2c012f608cb41a4b3034723807bee46bb33b43f2a9458879c1898b9d0bf99ad941661d9a65f225371c628687b0aa2974ad54bb0c924d371a7ccae28b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572ff92892706fbf7a2965100339c3b91
SHA1aae79971411719ba7c77a21cc983a22128bfbff6
SHA25655b44901a2bbd1ac4c59cacbba136c2fcd6aefad3937c01a461ab39d313fbe18
SHA5121454e4b6ed71168e5d4ee1f5f0716b560f742ce369536b70d42753f5d8a031b55e9d30cc7c43c2a8aab465cf513049e20a7ceb55abffb41a982f602b2f880cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a74acc163f81cb044df587d0a261368e
SHA150d32e3275751974237c23579e09856d9e362eb5
SHA2564ef89cdb292db37bf6fb6291f22695cea03c389bd951e5ae18d1c5499fe01a1e
SHA51203a03b460f379623a1f866d2b5f31ccb1bf826227f16d059df8b066cccdd7d5b87c6fc3921a000ef692503bbde9b8174675746803acfad6331fc0f9f5920eb3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfe2c5c9fa4fc2503f5d3fb569ea9b25
SHA1b0f2dce99d7e79c29d28029e7d3870c3ba693c88
SHA2565d072c7799a68b82085263ed68e3436902c81aa90b72d76f7c5003432a7b24ad
SHA512047d87705185c0f4a63cf78bc038a6afbee31281d9dc1783b9626e02fae9d431259fa60fb27d53ba6f988298a8f6f81966ef68600ce93126d177ed1f4b3e006e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593aea0a27d5b29547feef8acc84ec406
SHA1eb98822d4b27b048e2852fdc80b108de3037ea6e
SHA2565a2910b0e08922a4af721bc065309fc639ee5c781bdd92a9b27fec7f9653f4dd
SHA512cc32a11ba69ef3b356278386da208e1c2f4281b745f1f9d76d948fa23edd5d2a2368dd11d6d19dece9ab6a9e7fd02c3a75839187422ec30c24b9f4486b75eaf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529f0e71f335a559d572f58a3a38e9978
SHA1ac456278f7de73f93558f837e2703158c089a406
SHA2568e9f55aa1a9e79cfe47ca6a9d3f8907b64e1a09a548d5b83ef1117365ca7de80
SHA512e0ad167b121b686a87efd69d908566f7d65f6aa9b0717469207165419f6095a5be8a5c0598cf6c97600d939ff48c10ae716bd92fbddfe13934952100d375b120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b31421095330e5a640bbcd7e6f943e48
SHA1e9684b12c9a70519b6a1c60fd69f8993313759d0
SHA256b1915bdcac4b486ab65a333772fa5e13aefa3b1837ee3b85d14c9e5dcb8d103b
SHA51274a65ffa75f24f185cbd0651dd92e4486dbb227d9690d516dd1f4dfc7e6cb7334f0449ac508bce0fe30df2d5bdc59f7d800d2435174d1aa8aa2d2803861ba24b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a13422ce65a85c92b2a5982f97ddedd
SHA1d1f80b77bd41f032399d15d26cded8138678f228
SHA256bde4d09de91e9dfb1b9d89967c4bc891e1a9784e81d5d840b27f1abdfd910839
SHA512edadc916896c8b3bf951d985881937f77acac19eebd32c61917dd44dfe4cedc51b5c8983f6f0ad1fc1f9cedee794dadb537142310fa9e375b3280c006d6b9a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dfa78c5c6ef1eb362284e7bd6b4fd41
SHA1262bb0e5ddbb809523c752cc00cf672da5d41499
SHA256d922e8c9e3626d9da7019af802fe47fb9f5f02c6e7eff7b536b2e25ce83c6dc8
SHA512d42632e97ca9a1dc5211884ce29bd41cb398b622f7ad3021804aefe5ba3d5b5cd69073485cea018fdc1794f5908204666e2d9a145025f4291764a434a9d3e5a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c981488f3608cc9976958d40af16eb4c
SHA166c494db77fa36e9dedec740d016650f86f86710
SHA256e78de1f7035b906a3e4b436dc4ef90f5c5e0569eeeb347db0570463ab0c9f4ae
SHA512a3aee30df9e6ba0d05829a83f2c42e42d5473531d8a17f1a31aec45986038ac47b96640f252ff759f5b9af0b7b2b6365b9ec5a3d7b6e4e19216aae558ade2798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5260b977c664b4902fa0a4af224aa5b9e
SHA1403a658b9440c74ad26789a62458b2e4486aabcc
SHA256310c367de64c50a6154bbdd0cb8dee61ca4d5135073bcf7283e12e647730dd70
SHA512961e04d34c04d2b9ae18907a943870bb082d46c7588f08f0ec4921d213ea2e54ba29744ad61c2e4f96fa69ba980d79752b02981de8fb00ede77884eb4d8f313d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deefb0e4a69a68a96336a512bf82e9f4
SHA1e5874bed7fd96d05f7c1b4767674b93e453d2c28
SHA2568c01584b016e85667e4e95128a3f418aae3a7f5869beee9ce4e20ff707b09fc8
SHA512d4fe621b5e33a48267195bc2f0e3ac66de6aa0731d309ee668fcea89527c1dec4b7d1b04b52132d431ac050e3e5790b85364b1a20e07d8ecddf19207599815f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57312564b1cc308f8d079bde4c2986e4a
SHA172ac823f6d120bb944274690907ea7621ff79f36
SHA2565738c0ec9e1d5c8b29c467487f2c9cac6a48c969036e646a854372fa40d6a131
SHA512b5d2a553e642b2324a23bf178d359110928dea498a3cfdb0a8bb02caa493a34e8b9f248d8ef323c2458ac2ba1f463209edc9587fb074e39e0cd8b3875d84ea45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5294658b0763eb72547ea011dc144aa1b
SHA1988c190df2cb14a5b8692eb1f0718b2b20d8e9f8
SHA256cdb15251960ac11a16fbbd832d8c70e4e80ede0cb1e7e0aaf94c8202e1bed2b0
SHA512f89f10ae6403ed5b11150c8b899d980dd65ae2a3c5f898c75662194e7dfdd8cc028cfcadca6afdfd5865f2948fda59e4e8b54659d9475004e8b1b27e82184b62
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b