Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 08:57
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e24c412fc76b2bd451fd852e031f2ed4.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e24c412fc76b2bd451fd852e031f2ed4.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e24c412fc76b2bd451fd852e031f2ed4.html
-
Size
37KB
-
MD5
e24c412fc76b2bd451fd852e031f2ed4
-
SHA1
dd555d2bacf0685934cc1492a7020632599fb644
-
SHA256
192b030060a39cf53188853b24db6191abbacd13fd286637ed40997402d14bcc
-
SHA512
52adbdf8feeab01f122ee107d2f9d4969bd17ba0c11f7cf1af63a907482d7a75bd7b76d1f0eb791afa8aefd177ea8e5b4ef21f63763c7511efff773a812261aa
-
SSDEEP
384:OkMr5Y0TTwX9WrSmlii5/AANDs7zMi2JxQ+aXQybw5qytYPHR:dMrlTH29oIAND4zX2ZaXfbw5Na5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443525337" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fcb60701fad5a344b6fb04c7b3ff27b7000000000200000000001066000000010000200000006bbc5c0cbd5cebcecc0494f7d325ca1f288884a0c7614c308583fe1cacacc94d000000000e800000000200002000000036539942614b82f03f1074b044319e8462c70d0bf76dd63760d813d67473131420000000084433a766bd2d71852d6732af8caa16efc7e7c739cad98b0bd3622f2e068b02400000006b59e2186a47df5f448ed8b2dd2eb2f54549b0484fa6aaa05a2c5cc86fb0183c6e8b9c61ab095323d7be280f05596013a0104992ae04d4c82bf273f121cede34 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 808ff773196bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fcb60701fad5a344b6fb04c7b3ff27b700000000020000000000106600000001000020000000e90e1fa6d5edf00a6781a15a442e925c70d2cebc874589a04713dc56857f669c000000000e8000000002000020000000f467dc9b821588d423d4e9b297596d6f0e77e5b900fc16f28afd05a05e2ddd9b9000000081526bc6615e4f903c360290c10c9d2a7be509101b27a445ae24ee2d643a38858ddfffa0187b98a6244264b1938afa0f429279d2123e6872b362f51ac708c9fac3cf2a09b9ba53eb6c21f3a145ca9641f569c4ac0c48efc8e75d8ece28f3a1cea22630d3089d9a75344f8d629a87d4e771e59669d6a04dab20b926f88e8882f978d53c5d023a959b00bc6d2266df560f40000000a71aa013a23d2e3a4a376c8b1fffd1e3e8f2e9f523cae354da9cbd69f051b6c92de7cbc747bb76922539da3d404af6a811b9c6fdab8fd3034ef555c951e86d58 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9E894B81-D70C-11EF-8B1E-52DE62627832} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2948 iexplore.exe 2948 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2920 2948 iexplore.exe 30 PID 2948 wrote to memory of 2920 2948 iexplore.exe 30 PID 2948 wrote to memory of 2920 2948 iexplore.exe 30 PID 2948 wrote to memory of 2920 2948 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e24c412fc76b2bd451fd852e031f2ed4.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e227ed25341e2c1cc0d1078338bd44b
SHA1cad85c5bb6b72ffae630b6666473c709266f9803
SHA25650e6ef7d8436cb84131e02d0d6fa4f856bbeeca64c65a34f915e59841d51459d
SHA512896adcc9686db4a9632143ee9261a285cc3f219cdd5bdbbac6f87cd5ce7429b192b83d57bd97478dacf52d65347aa33c98c6ba5d8e89ccd03cd3fe1ffd054dd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5547855a24b7718722d0523f1ad9f9e80
SHA109197a61bf437f9cda63fe29df26ef7f8457a910
SHA2568bd4ad7ab28b779e1c285b2823fcbae4b0aab723e1f6a66a4c56220461c61301
SHA5129214aa3b922ac8fbd3b6cae7bb96f1efd8ed8f90f4c88f186cbd02d7a997be261c30dec1c7dc438317a7255a807f5c38a5bfe7a63364a193141165bd5e0a7918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5519f113fa4d7774745f1f029d0f8c6fe
SHA1613bba7e2ebb80947ba665b6305ed580172d3372
SHA256cc569e36495dc98983ec182733844d3f2297164a61d92d0a0165978fc7ef8198
SHA512cd24de9eb285f618df49cb96efdb2b963d9d8b705a2370ed13b01bcbb32098eb8de106309892e2223eca132fa945eebc51d2d25ad57dce9627179de88cf8c08b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5678b1a964da4c0307471f7b4f3094271
SHA1755ef8a83a486da220a963c36e6e0b4d5fb21135
SHA2565848cfdda0238b06640688024528696cebcf4fa0abbe1d3e2bd05f1d43e17ded
SHA512e142f8f047be5a621416bc41b8a71bfb5845f9b5f1d462d82118d8aba397a8c386a4ae0c2c2e2cd9d29b2b88786667550a8acf81223f35ddc8bb9697e5df6a94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3a8c69d6ca30230f76c7c9796cb21a9
SHA10e4c2d70cecd4343bc6b71351d44b7fa1c34e697
SHA2567fd4769c80476a8046f8c3f882bd0505c4654f4999265a1859750e7e80d56bc5
SHA51285044dc00a1e5cf735d83eb6e6667b351bfbd3bd11c29bb3e27e355367e5dfb02fafb831cef14878178225e93302a07e2611ff2fd16aaaa598101468d065f589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d1fb46e41dc17550d1c5c1f2594f23
SHA127caf93013a99187c4aa8934fdd9e90db6869cbc
SHA256ebaf568fc6146c7514544300fe29b36474024999f3b35b75b3b85ec94f70b2ac
SHA512ef250c2cf3f75ec449ec05d161b7da772c4501012a8b973bb0e8da56e4bb2ffd666bf922b238438a85ccc19db8dbe780273add536b7e5f3b32f792ba5d31fdcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564a44df5b6e9afb69c938ef71c3a6856
SHA138ce6c20853d692d1239ed848ea5b2c10b6254cc
SHA25602a14c250597772a6de18f70bd110e1ecb621aff844a3e5dc82e66fafef32af5
SHA512ad7366c0a89a4ada2e7930cf5efddd1004438279c9e368bff299b8a81204e31b937f979bdcc448b20b637bef0935d5f6fc6f373ce398f35f845358140bbaeb0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d41021c53bf1b79fde026b7f0404922b
SHA1faa0c37fbdac2160c045d32adfcc4a2b33c81882
SHA25643c37c8db5af4973f2bb1d56786e47670f614141aa2748d96ee49116e131d356
SHA512527d6ded6c971d650d93bffb6616f040beb52a1a8a410b7421989fe66be9e16a1b1cb9de3945bf6da47303b284c606dcd8603698df15f885ea912569aba264b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5621ce87f9d0ee449be4e174ebe62747a
SHA1dd80b9f9523a1ac0986a564598f7f723eaa9e326
SHA25675d8329d45aff1f2eefd4a001536638c9a8514bdb35bfe5d51897a6e4da1e65b
SHA512dfd3969a3041fb9790bcd70fd2aad781dcc7c02200a36f0de86cc5af7e2772e792bbeb5afede276e408e362e14dfadfeb0aa614358139c7e34ed7ea048bb04d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fc636538fc34787e6d74609af0cba1f
SHA1866dd694613486b187d54667cef405225bc0db23
SHA25664b8760d13aea40d12b52451b2e883322c3be6ab8df884e29b5f28d194f221da
SHA512e7b6d6a5a47d44c3295b9c4b061c390098f4784a76b603d63e1f38c1343212267f1de7b76d7d7d0fa684d367e05957e6fffa6fd1f79faddeb41bb110f1827f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f460af62ce17dc3693039b826de0e38b
SHA1fb9607ea83f4fcf38069e0db9d693674e6c329dc
SHA256a9ef5c49cfb4fad57c4d592897fb9374fa595455f06253715e8f017aa17a6324
SHA512d838a85775f9c5a3ee14c4b8ac8f23d28e056db9a94114caed79aca65fc96053eb53013e9aa9365ed7c7940bb957efb32e65875c9a134e98eec94a886974e10e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593ce81e43933efdcc29c28bf06a8cefd
SHA1fec21b9aed425f1c1275a98ccf509a35bd2f0144
SHA256bc84ed8b241af645b6c9273ae35a47dd34e3d9326840c5829c2b1e4b3f31a841
SHA512436809f3ecc4b50c7b0b24bb623ae18abfb915fa4bb6e86805572c18340a6de6220270ae273a5a6a63bce7ff88109763369e68d151e60fe635d19c8cda6f93bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bd1306d25d6b4f921ab054008b67378
SHA18d1872cfac41a92b500c4f495b4b86fccd1870ff
SHA2568ba81c12f936fb22f33f2541700e3f7139546bcb2e6ad52629b0a3813ec5e605
SHA5124ff16721fa2fa8c4bef04899dacecbd54419f4f9c5faee1190423e91fe9766b8ea92c4cb6e42a795b80357a56a41f87087bc8dcabb6e9e56a8a51dca85b23c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51afc4e74854e070643529d229d410d5a
SHA1e19dd0d195f2ed08e0873eb3d03df87435c02727
SHA256139415aff76fbd7df8f6445518a48ce9bf5d7415151b64a21b384083b01f985c
SHA512149c65f2618bdc1b944507f7854177a7cf2e5f189ac0624c45dc257268bc824e83ff7ff81e2629833e2780184374ed4ddc04ee665e99cbd9015c36e8bae1d410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d63c8d81a27eff8804025f817555ff9a
SHA1b6d4dcedebb0fbfabde668060eee36b823ce3753
SHA256e033bbe01d474da58e877553b01a734a84fea01a6b529ad6bcca87cc06a35e89
SHA512d7e4418fc9328eddd8712eed29437c1c5495ecc7c4ccf6e76210bcbcc84d8db99eeafebfcece667e510d970416568bae4b700c29e4897c57122606814f10718e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bf6fc9efe4e3df969b07e7333bfe6fb
SHA1bfd7d5fcb5e5ac30f5972fa291cde8df3f8ede19
SHA256bc347db9314ede15b5e11b9cab2554e13f32fcbd8f08f9362b2fbe06eeb7faa6
SHA51210227e7e45045264bf17ccec9d17535bc780c7865f4c2e5aaebfd6dda4df6823a7143db8c2c1c8f08f376dd010c9dfd2e6bf3b9fe503e46db90deb8af1f57deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb45a8cd42908e6060ac959b81add9f4
SHA1e907a24590c3f636235915a27dce7bedfdf2cb56
SHA25613a683d93ad886f69e31aff651d0b94eb1ce2bb1b41fc84356e83622eaea0dcf
SHA5128a654bafcb4ffde653cfc32eb5cb47b8a8f3ec5308ffbb2607c28d11b48c30296e43f8a592141d7d55ed6bb57b6291a6b532d5943859866a081ef9971cf2e471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ce3587c1d89df495808fc070d57668d
SHA1689c5601780973b3a2c734d19f2eda7e5a446a52
SHA2568357d3ddd7b7d2a0814a33a19afa6b2fb7a762c75e88388f1e10a5e93784088c
SHA512f41ee06e0ea2a88c623d5a2735ad0a8df3cb28497f562309ce4ac65435634f48b9ba3bb85db19c9f74ae3cc232087dbc1012dcb050427b5e02ec536d7e8ed741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5577774ad603a11802b3b9f30706cbd16
SHA1f2d6db0cf8aebdd79364d3717c766c27d4665163
SHA256d37bddf2eaddd8e418b1316d98c0f8cf3344ffcd1b81453fd12c60ce65283bc8
SHA512fde0382ffb90b71d7fbcb0080075e0b0e10f7b89aa80f246dac59246ffa3b9920eb0392232f827bcfb7558a611fd673285e81fef65f975f81218149c5405c863
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b