Analysis
-
max time kernel
137s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
1167617f7912451fb3cc202b00625720_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1167617f7912451fb3cc202b00625720_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1167617f7912451fb3cc202b00625720_JaffaCakes118.html
-
Size
138KB
-
MD5
1167617f7912451fb3cc202b00625720
-
SHA1
3b6a0a70321b3c9f1f5e9a87eab3b32fc8832825
-
SHA256
68c2d879cbb601d0ef3e55a52093b5a755da65b587a30dc3c3a5be366183018b
-
SHA512
3e01da7a69cbc3bde9ea062185aad99b900a3a0b58714845968862dab4640755e8b01405e0e19fe44546b213ade6ed16fe66174acc5a07578b3927a3acec614d
-
SSDEEP
1536:SedoI78HFCHBrHIJXKNoWrlfQyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1Ul:SeGPWqyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000009857c0988fc8dd22176a5ada312e66706fb262d0d7e14c0d04e7c17852ac485f000000000e80000000020000200000004f0743deea883e4f1a3029d08c0b60b9a8634ce10ad7976cca25b77b7cf151b32000000012e4be0094ab1b9277192abdbdd437fabead15cfaef4467a7814ed59336885d4400000003be6032dfded227fd010ec69d137ccecd918b96b41da70b3909201d6682e7472003b5ab1c21a98ecf071bd02efe335556e18abf0eaa5897537297a92f42420c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C919E1F1-81F5-11EF-988C-4E66A3E0FBF8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434169679" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e12fdd0216db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 1568 2180 iexplore.exe 30 PID 2180 wrote to memory of 1568 2180 iexplore.exe 30 PID 2180 wrote to memory of 1568 2180 iexplore.exe 30 PID 2180 wrote to memory of 1568 2180 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1167617f7912451fb3cc202b00625720_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fdb71c1ed524a92366cc597d86252ed
SHA169879367a0dbe4aa3925fc8b30d7444b855270d7
SHA2568806e0d79e0446f641dfb72e03cd851327dff84c9d3f5c1ba71da228616cee58
SHA5129a7fa75d70c9cb7500e62dfabec07dad4c7dddf3e755f60a2731495c81381c2a0585ca49110a042029cbcb136b86dd2428df09430ca4bfb6719471f5d3333929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f59dc041ba986a7417528b752fc2ab0
SHA12614057cc7eedb4872a046c43e66d69b64ea3b5e
SHA256798e6e2797dbeb70a1cbaca8206d09e04aac0d72919005c6ed7a63981fe61c65
SHA5122b1a5c676578b16c2268015e2abc49250d765c11aecebc628df1d36b0610d94e422590d3c27aff995f78b5d97499448586d1b607c8264610f8a249384c39f76c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5055ba2ea8aad24eee883269c010ee18f
SHA19abc8e4e226ad21f0058edbe0dfeb7b976545930
SHA2561a0c18628dec62107765c0193ad3a94e98695af5cf587376d93ea3d56c4edab2
SHA5127b9bdc286fbd583b8a78d048dd18f63011beb5d886860d508a86c0ddfd498b5174be6b2a35341324af68b77a7ec43bdd798a2952b11245f2928fa17bf7cc889e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6c4d0aa65bc934ed655f640891b90a2
SHA14aba6c3b91331c354785b6c3a7fa090d4674e9f8
SHA2569dde0fcf9d141f5074a19b2cd98f31c6212048043cdaa0a5b6df1c67ea9124ab
SHA512e33b1bb1c7183d8e3480ec1e8c0e30a3dc49619b10add1be0438343a7ce38261d6d0961635ed7a50aa24082e27ae8173a7b4e42d8efe6b924d6679e2dd6bfb03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3e5340b8b2693a7594e009743de1167
SHA122d8213b88a0637db58d8131b54987d18b0a9e09
SHA256aeebf5d64256d2b00d83af3e2d5caecc6b2087dee16480482046e32385b8c13f
SHA51243f046d4a07127c639fb75ca95f03a19f0a4174e5b1fe91a336573432ec1fc1c799ba325cef479be8e8472402ba51e62f9fc5b580bd48a2d5a991dbd915bd8ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a486563a7a1503f0f55452fe0453fe3e
SHA1c57d6ba95ebaf3d55868e936602f012fbed2ed1a
SHA2561a94d4f381080b326c23e1f38dd8d793baf24b53a023f642f73106367edc5b56
SHA5123345908c9e956214aeeaa3f0a6e34d9da28ac28990dfd5d4f0e97c891848950f4e45ce0b87f760f4601c8eca211c2a708e9fc1b5f1f29039aae28cd951bcd030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589f6482098b8fa72f4f8bffad780ca14
SHA1c71059127d42fdad74bced1b6167b162d782b08e
SHA256efd4f53f373aa7fa9feff137082deed568fb684752de7a51bcb073adc86032e6
SHA51262db10ae636deefbe94d8ba2efd9b57b5de42f9d92122784c458a5ddafba764ba6f2c55e5c22928bfcc3739b736dcf6275ab89433c47d2b5a802e03a49192c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9ef2abf75c86816d66d46160de7860d
SHA1fb4c7c28d9691af27ab76e5ad1bbddbd21d66b29
SHA25659615ca89d1b92b364214fd5498f4beb864361e14b4e21d9312fe5bdfa699dd1
SHA512dfb5181d3f9c58669511ba38fb98deb28e93c78a48ada3e9be17d7f1c9042a1558d3a9d14682f026d0e36cdd9dd1ef3706a62a920e769499d3f838d938a0b39c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c188dea3c8d73d149186dc5888ccb249
SHA1a5d5cd48b4a82514a4df5cc334030878ad428529
SHA2560c432458cc3dfe3e38a2bddc5fb016717cfec3f93632634ca7d3516eebc6e257
SHA512ba3b14061306db522b9391fd6f6b12acb7636d0add66b8a6801014abc108b4431b365c67b6a370015abb5bbb7f12fa4f0992791696d3aade271c48dc37b609bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e470607d4129345a09b61da5042cb533
SHA12a9d5639966542174045c444268d13cbcf177aae
SHA256c04641e5eb46588d810ae0e96f6a611f680c0afc3a752998814f4f928ac3c78e
SHA512af6384762b34a3d67cf4033ba3a344eda144d19e80183e7e7a9976862135b75d1eb25502229b22047864cc301428851e3707c5124ec570909eb6d2890fe9c4c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5767a8442b6ea6999b5b934ccd3673e50
SHA14d4d8274345c0ee054dd736e28bcadb572588b39
SHA25661934afa0195ebdbdd7201d41fdf8caef6a291a82e247a9e9c7e9bfa3556172f
SHA51238e1b1281537386a9d24ee9789d354c45dc41b41baa201a20c110a55403b44344f735fb236384df9b0d235b2fa91c073cc7460e4a03a041f51100c1abd467226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e984adee1aeb8032077a6eb6f2e832fc
SHA1075a2f44cd0deb8dafb409160bfc799d88dd1b91
SHA2566f561cdf6ac12d30dfa28afff9f36afae79874f4e25e958bfcd0eab81c2af902
SHA512e916a3df3ee0c4de97a37102c50942b0fb68a9c7b78c2b56e346bd507f84fdcf63a20c5663ec331ef462283e6ddf18d94844ef66af1c1310ec3d07f6c317ec5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5215653d0c5dfddfcd273b7d34e852466
SHA132e9bb29b3ee0c380f14d8c6f23565a3ccf72875
SHA256616c75f0bc1523e0d8b3c00922b4299206bb02c214b822cfb764ddbeb350cbc5
SHA5120840ca5718c4b85ce8a2348d6a730eeee51bbea45bb667255f60e67e9a3066a4912c99c83f2e8275dbb090cd99a23717008a2aa0c05d0ec4d9414e0291c83c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dca3beaf1ffa7ac34a038dd146e7b7a
SHA1e20c08b12a4aa26903e6d7f5bb7c276c44af2325
SHA2561981f10e3893c62bc9d1d3e4e12fbf40251193aa8cc38bba54f443e3e7152a0f
SHA5128b9e8e8dd0d93bf656a81855408f421049812233965e48be6746768ecaa97cf7c82b57587d56b2056d59496094d85b44f0586f2119c4e9d9323859305566cf8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c4d8b8462309fbe6eeac1237657221b
SHA19dde72928681886b88350c212bd007e8d7566065
SHA256d739b3a932564eb3a830748198aacbac1e340a6c02d1c327102536384a4fbd44
SHA5120d9696213df385d9a027015f832c41e8bb30515a01b081aadc692da605aa8c6674b9e928b1609c0441f32028a2723adbc8a4ac47adef2f6066e24ac00b06952e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d922489c548ab8735afc7a42d401abc
SHA11fb0e357c414f92ad410f672e348a4a2ad5e736a
SHA2568ec89855435ca9697ed757b3d7d88aa878e32af73858b5742fbf6e7cce9f6938
SHA512301e880d9233efbb2b25740901e7113d286c9c823aa3a27695fa5146571417d8c482cc212053f37b68d4cc429d5def369ad222a9699ee1b39e47c3fd0f712f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc682900aa52cda7ee841d369a29f13
SHA1050374d66735b016942d49e5da2b0992be9c1a0e
SHA256540be38e6e253250bd58f4b95f4e9cb9fe89ebafb922ff772819ae7654e7b2d1
SHA5125c162326aa9fceb53077cbe0f86c31327602d065081fb1ef2c6cf85e81b7d823e3263fb6a0da363aea8b39bd2c8ca525f3be8c0b8b783320d610b12de7d8dab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583fd8972696f358fc57102531c63615c
SHA100866c33e736706c96a48a31fe1f876c71c0738c
SHA256c246fb59a52df36b2804dadf00ab2a576db770a6b92e36a3fef0e43c1c45d62b
SHA512dfafe3dfdd767ca8dd5df0df213be51c9847e6af488a6badecce6cb3cce28418d2b55371a62817e27e687ae65d3ae493e2b9f3fc89a8d5632420cc69dbcd778c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8b8784ad16f8df1cc7d075f60b2a835
SHA1dbf32af49eee6ff2ac489eddcc9835d200ec0ee3
SHA256e064589a430e2955f5eb750cc385106bb65281892b91e387ca6d44dca667db48
SHA5124b3c43ade50a974f6104eef9d58a5d60bdddfeca9d0ae265feec9002b08a9bf72932afb4d1b5f020f48864f80c47a2762e01a84f32a2588206a8c95b8fbbf09e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b