Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 22:14
Static task
static1
Behavioral task
behavioral1
Sample
a459c11770b6fd20d06d7c5ca45d5b01_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a459c11770b6fd20d06d7c5ca45d5b01_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a459c11770b6fd20d06d7c5ca45d5b01_JaffaCakes118.html
-
Size
6KB
-
MD5
a459c11770b6fd20d06d7c5ca45d5b01
-
SHA1
d880645c18f350e9d69fae91906d54aafcd79c89
-
SHA256
d804a0252bd6e1deec8887faff643b08b7bf7fa79ce8405f67e6e4cac51b332b
-
SHA512
31f9756fe232c0d94d8f39313833899eac96c05759a9e838a2c6a273aa9a7ca51b054359867b672e5c161739f3e678b8049279f314ca9fe0ca763b6c48b57fca
-
SSDEEP
96:uzVs+ux7UliLLY1k9o84d12ef7CSTUit/6/NcEZ7ru7f:csz7UliAYS/R4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C8D1C11-5CE6-11EF-A7E7-6EB28AAB65BF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430094753" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000007ab406b08dc7edad8f0bdc27d31bba390c442c5c85ed63b2c9eb385afbc7be68000000000e8000000002000020000000366ed39738e0cc46757ec0747a2e11bd815fa1c8aa28c7558d447e778a013adc90000000c03edfe541f969a0f4e5802bbf84d090460d5fc300dd05bae92d3eb252f089903439fd7e1ca6a9334c4ed5684f81f3e9887777f52bbdad1043e1e47eb825659e4c03b1731021ae2c40a8fd499b91217630fdadc22c68e6eac6227f492d8ed38146b32fa8948c4f5eca63becc9ff10afbe915a2be5962e9b5c9ef6fc616a6dea33a5f319808f4733f3ae3599e0bb38a9940000000683f803829987f27d9e6a1b67c4677c0e3ed1cca09ec6a87fe2de5e9cbe32e3df5902d6ab3fc13a6972adcf550d9eac3c98000e75ca51a17fb81998159303789 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90541e0af3f0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000040d9d390bae5fe58e2527ef64238524d8ceed437aad9014ecb32d5e70f789eec000000000e80000000020000200000006b2b050377736a1e9f6400c08820b9775313b81732bcb1b64c859d3705a42a9120000000c5a77768ff31a3aa08f23561bda0188d820b7c71b9958779fd6907d79732b4a6400000007b33cf60c7559b565b18e8d361479d471d11f8ca6fa5da905785938c5969f20470d1a1ef40384567c0fafa8504c769784954cf5f3059ea077c922489faa453b9 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 iexplore.exe 2200 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2820 2200 iexplore.exe 30 PID 2200 wrote to memory of 2820 2200 iexplore.exe 30 PID 2200 wrote to memory of 2820 2200 iexplore.exe 30 PID 2200 wrote to memory of 2820 2200 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a459c11770b6fd20d06d7c5ca45d5b01_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc7c04b638337697ed84722b47b44b71
SHA156fc65670147758a2ff26c9d11b4044ab3adb131
SHA256a25f37b01f746e7b30f5f04be64367c369e4164365fb3465b14561c3a8416f6b
SHA512183751f6d01e6dd12487a73017e3329c0fcdf45270d40bfbb28733d69d8044c2e607ace18658cfabcec845e3b764258fb35a0615ac6254cec8e518dbb0784548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a4a1c9389550eb25f0a8e98479024ee
SHA1494da27c18184acd569d83c1d49495daeafefafb
SHA2560002d3ff4259a4b01e5e15646a4cf566c83e8bb5772082feb59ec32f2b997b59
SHA5123967db5242ed666a557f9416ec33656d8b670d93bbd84045729b5035c1889861c3706a6a9c2e63de16821fe0b3e87b2fc77ffd06a687ac6e38e8daf86781785f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522704ce3f178b4cf9a74fdd853480316
SHA1ef4ad345ae920448e650257cae14b06ac2e23dce
SHA256350c1f48763ae3cc516a0d915db5f89ede889a04838e4ea3089aeff0ab69b135
SHA512acfd8d1c1c1b2a20f8308ada17a407c786b4dc28a660543a34dfeeb042d579209303982912aa44086b743dec1f75ed651cccae199537f9e1ad04eb1cc3bf4a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c32a964257edc8bf874e28e23e5cb06
SHA15e22714fd2de0188d42fb0451e4cf8e00b745eba
SHA256361ae75a8691f44eb057a93782a002d5a558b8a83f9ec574e24825e42b436595
SHA512b752170819832542676a0113bff347661ff4a17be81adf3d5a19a9d25bb4bf6188e095560d9467a0766223cf81bcf3c3a64d6d2bdf9ed7219d7fb9dc4931f389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbb698cc1d12f489f46d85774b72c4f6
SHA17490f40cae88bc2e1acfcb601fac46efe36a2e90
SHA2560d7993a4a3eef59ae0818c844e3b5bbe444ab99504e9b6ea4eca8e162709241d
SHA51238955ed48a52e5c0de7b1541d1b7b603eca8f75d01056f91c33c480a23a20872b5ce34434971ca25170d0d821c920d16dc80c79cf5204de74b04a557627e7df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b239af7ce5d4e3d8b24ce3f0b614ebb1
SHA113dc026544911ce2ca9a3a60547ca95d3f1c0d85
SHA256d5b1f014cdc3970938758c8cfcaa8bacc1464acbfff72af6c2efc9fb461fa352
SHA512a50d69385b83de8d4860937b0807f93abc7c5f1ff8048218460b42ca21b0351c631b8b7082d2327c4d5e6967e2e2c675dc1f8a105dfeaaa1aa041e180c9a28ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a428f50673552ffee21a39e156f8ce1e
SHA1259071e4df864483a5ecad715fe6aabcb134ebfc
SHA2562b266d9d3794cffb8a521e7bd7e8e08d930bec5c7e56b694685dbb5d8daec3d8
SHA512587e0576a4cd7abd78f9835cd5106ff0c51b7bf0dfe16396001aad1ad715f6ee8fbccbeb4101f0a93f87d5566ef24c81390767c70785cf41ca126061c37c8ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c8ae0e75bd3f3e8cd4e776066f95e9
SHA1539c129898c3a16da2c0879916e51a4387f2ccd4
SHA256189f669aaac20516c9e0ad8ca2c2627a736f429a3422f2814599f25c836afa60
SHA5125122e24f55b896c48b622fbede0d3777383cc9f7a7c8bdbbe358ae6f6c1470baa663d7f3eee86db9b58af3c7d0a39b8aaeb8afaccb3e70c8fbb100bac2858c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595796aa77dd4cde4b13f9632a3033948
SHA10f7f51adb71b86b5448b59ea3f09dc9f748517a3
SHA256afb4bf5c10cc7810006da284ac7f5378e164b3d33e29a41e05db3c9f0c3e8994
SHA51212993983135477a231e4f0bec730aa213956c7bddc59768966f6d8e7c86832fb1d0e730554fb323e567936de84e6e0f622a501dd9f53cd8d3a49dc0107c1c9cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3234af22fecbe427ad34ba1d4309f23
SHA1a329c46f86755352e0aab93bac240c6dacea87e5
SHA256094f15837354074c7e9adc1d96caa176c85e66b4fb59f4d7820f9eeb4add448f
SHA512ea6058f2b2e13cc3e99211a7c25159c9f80a8521529ad2c6b97c7d5b155e2e2e9108f29a68ee7a949b8a4e1ba72b4632146ca7597ff5c29720d7c633c59878cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edbe47eb7d43eccb2d28807a22254ffc
SHA1a47090b1e1c6a62bfe56faf5289053deb215165a
SHA256503c5f11c8a2e45e2fb76f82c4c687b4365ca3688ea36234385685e3b17e8e98
SHA5129f3c97cb6fe5d8e3e4290966171f0b135634bac34cf273570e4febd93f64d18b9483eec4f22087e8912e3eb21fd90ebf47e07c3349357842510b92fb31046bf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b31e8a14b080a3899f7709ba19f6c74
SHA15840f7ab5ecafc8aa6896d0fc8221d8b139ce73f
SHA256c97ca878a4ad67124fbb6052b04eb629b62999d53666920a2b5d2a1ae10ce123
SHA512a2474f6ca62cb3b88d4654646bb5616ba6948c435e73111f2bcc2611050f348bdf4f3c8b0733036b4ae817e027239353f19caeac7bf84e75bc2c0e1acc7ad0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5397bde361df0ea33c3348a3fdcde0f0c
SHA1346760ea8f2a1713b468db0b08cd6fad1f01cbd3
SHA256be3741d11cfdd41263e2dd21f99eed5374cfae7cc1570cb22a53057dd02e5bc6
SHA51255a8fc4512caf0c423635d56c2be9eaa734fe23bc2c5288802fc3f4921d95f9b6d73c0253619afbdfabc77fac11cfa637370c68134a2a12330c43c5201a7ef6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524871a7baca5932befc00929b85fa1f1
SHA1b7d8e592f268f23f6df32b9e520fb422f1c8ca50
SHA256670c5cc375fe4b6552b06c6f95c17ae3248896085f5fb86b2e82062a795a3570
SHA512a521f3f8d34c4ebecd591f5d2bc3d3e2e224aabe3e47a51405e9cb910352150b313f7f721aa4e8b611fa921d9bb4fa4bad1d1b6ef70b6ed0e351120a87d33dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f33cd559a7837d8bfdd2460a3cfbe752
SHA1449c2bfe045b6c641e750900cab02a305199baf7
SHA256000527ffd41820f303d79a01ccf9892100eda7ed2be5c4db2e8bdd226ae9e3f3
SHA5129c02eba789e57be94ce6520d617190bc4b48bcec914eb8aed462d26a477a142d2ab2dd2327c4c559376b6304751c0ea87e6844e743e95f9a751b863be690aab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55486a29f26657b649efd00e4955d33ed
SHA1dabf8aad26c77833b6a9a276e4c7610900720fa2
SHA256e34252ac2234d9d2e3470bf7627aedd2c764eac21d01a91c1e624926a8e5ae7f
SHA512635b5b2ab29aa9ec86521e3896868b31bac1edfe70d6fd2044505d52bf8eba778397f2485cfb51af3561c35517f3732cab463ea8ec7fda20e64142bf5d63dabc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570a07653be0e49ce5d64bfab6a9b255f
SHA11b24fafc5e5f04c1510cd8b9688359571dc7b974
SHA2566ae04c2e677209de9d5c93000630848b601e1c72c2853fe76f7ce88d6c9092d1
SHA5120fe4d7c7a547788456f6842351e2864aa03daa3559c9dcc549368029f76b689e09b615af63e002722935180983a3ef2a035c9d5da5385fd94b16a87320e80935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5436e697d9b89921360bba5af2d71af47
SHA13011d5c9ec2ff344a9a2cabc830366f2250b8157
SHA256063e73e3ecf8526498df057c1dfc65aaa141910a754b51baa3711779c34a2ed9
SHA512aa0cdf28f04b5b6f85b593a4b2b35ad549036a8d48e828ce5fe88bc8738066b6cd62b7722841c3b6baefda787a836cbde3a23a6ac73d7e86ff17214dc75832ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc61c8d950258c951f9cfab4e44b2e34
SHA1bcf85952ac1158dc2ca66831e57e28abebfb227a
SHA256b1d41a2eddefaaf14782506c623f3347f7146055db5b9f27912682443eda9bfe
SHA512194a6627ac1fb466941e82a451162a9dd4a91382d9b4bec27caa42a236d4e3d2cd3b0d49c5c23415d7cc491fc41f2b81d96a6db533c3cc508f7c5c09a6492889
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b