Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 11:52
Static task
static1
Behavioral task
behavioral1
Sample
e0202686676b912ee11ba2e8dae9b15f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e0202686676b912ee11ba2e8dae9b15f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e0202686676b912ee11ba2e8dae9b15f_JaffaCakes118.html
-
Size
22KB
-
MD5
e0202686676b912ee11ba2e8dae9b15f
-
SHA1
daa543eece8c5bc438853814e78848c633381496
-
SHA256
6f99bc76f81be4e663a2ecfe178a2b8201c306d6294863ef54214c8ae5145779
-
SHA512
8db536ed9cc94a49e691202aafafb3c40d96cad2bd41d7c350a31b66d7d010f59c197d05dd6dbae056c34d4ec32a477d7eb6d3afc7614eda82950147498e657c
-
SSDEEP
384:Zj7+m7qs2QkQL4gDQN2rFbEqn+4FtN7B5UW2dkFdR8WgOHaLabqGCAxBzUWPhtGQ:0mh2R+4gDQN2Bbl+gtNT/FdRIOHaLDGV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000004bbbc944f8b1e531b05c8e881fbd25e88d98f568d3808589913d92952ca3b179000000000e8000000002000020000000c2f5e7bee9b5334155446720323c256cc3a84e89b0e11009fe4d75854c415d3020000000243c212a6c74d5c6979f1eb93a27c342f3d97f4a75c31ac33ff35d3cd94a91c84000000057e7086f0b79e8caa1233df93028dbc4f2b11e09b3dca0b60eb3396f7db42577465dc7f9442354034cb34dd5b9f86d88fbafa6f3c7b5cf9c92b3347f56fff328 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000ca55b301ec290103ef61112f121629f61098bcd0a96678a7ce95c4ddc07eebaa000000000e800000000200002000000017c709d1034293d9eae5dacb5dce93652d27426fbd54ecaefa382248ed08546c9000000089ebaf55da2d15147a73179f3928698f0305ba4467a81e366dfa6c58f078ccbd41f62b7efcc192301117573f18530341575c319f9e8a5e68a5f7a85689f1ee32069d1a545154b3ff838662b4b799f6d115a7351af9381eae6fa86929877e0cdae9ab4ed4fd98cf60eb60504cf7ffa58d98ee9c2e798fbd412e298cdb01ba659bbfbafffd7b9f8f976f2124fbd73e26bb40000000ca6e4ee68d205a1e9bf478361566caead621a9f8f10d1edb08fdb76646b636eaad1d79ea71996b90e6db08a40e38071703c611180145814174aef5076b6343a1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103d5dda9c06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E107DF31-728F-11EF-9E5F-7A7F57CBBBB1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432476642" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1792 iexplore.exe 1792 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2776 1792 iexplore.exe 30 PID 1792 wrote to memory of 2776 1792 iexplore.exe 30 PID 1792 wrote to memory of 2776 1792 iexplore.exe 30 PID 1792 wrote to memory of 2776 1792 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0202686676b912ee11ba2e8dae9b15f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c073c60cc6e1d4a3e47e1598c16556a
SHA1f89eb232a90976500569349ac2e3860042b39272
SHA256bbb73507bfaa1925b70a67f2ca8ecbcfa2b3658ea20f521096f72a6d3f7a1b2c
SHA512b75edb509f61fa0f538f5e8d366eac3f11f385d408ccdac387ccc3702e14389fbce649605ac7cf58bd9626a0f2a19909358cc18e523452f3f9031424d4db93b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c83d7d43eaae016d449cf73f388c493
SHA10e30fa20c1f4a4f2a677a477a3bf9ec203d5dcf1
SHA25699b49d61e836b47af3dc11d33c4372dc13678ffaf922617a08713bd7a0e0d22c
SHA5125939f937fbc1910ba32dbd9bc546a33246b3e1c31ca9e4b2dac85270ffcc061ea9ab84967429fcfa57c47845fc71626a4e2b7781cae8ff0faa103bd664557c76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57695c4996f553d9bda7a97fe8c5f375b
SHA10e2b01c7ed84dbbd167d2feb78d54499fe5082c1
SHA256b8512e8903e56da1d4456874eda569d64ec873f847e2ab6e58806e6fabb02bcf
SHA5123b302fba750710a2da47061eb557ad3795038a1a8da617f2e0ea5a4968edbbfb97e6f494d6d011121762f0ec93e02f3c8eb4467f6a10cd13b8bb30fcc139a39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e07123e32e8bc351183a24d4d2c6fc6
SHA1c2dca8d55b4ae09acd74c99288d1c5d9e11153e7
SHA256c0c468ff113fd25a27abd5a789b98978502b21c7d284d674d29f3f4312fb3dd3
SHA5123649d73d1c21ffc0160ef7c7720edf87cc1cd515f4f29219cce32e6a31ef0036f599936773e1ab0f792b7dfd4a41722a352f15da555dc5dc65ec7c638ae76a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534fa7e7c274af883ffb994ae69b14795
SHA186cf0fb6b36ec7fb77193fe3d673fa91ea3024ad
SHA256c98ab97f737fef29014a4ccf4335ff869d79781949b75f8389c241945f326690
SHA51298de5a2b8d0448de1fd3d687626a0589c964c6cca38d11f478d342ea90d130d60bb977fcb88b3753310266ab1d4cd23df34b464d20b0c8d9e841e0f742c6c799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e3ad9a555ee7ea561d9f285c082faa
SHA124987c54c31dde2c679abe71c5578029bbe668af
SHA256bc85c31c31ec0c1b8e19213c3e44f5bfbb54cc60c0a8144faa859ade93d123a6
SHA512f4b2c0b5191847f4bcda85a7f5d104c885b5ae68d9f003808447e9a6f1a5afaaa9eee5662cfa0f30ddb3ea169af42feb68085d8bc0c058ada1b2811a34b81c82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c9e8c496d7ff349a3d893e10595c827
SHA161bb9d64597d561da94763702cd8bcd5d75bcd68
SHA256ccc899ed012fb1d5700213b242468d1c1aed6669a104d98cc41a161ea56df04a
SHA5124ff341b465226f2a8dd09b6c0391e69561e423bfae74028c54d8db6470c60559a2002f514800d177e4689081be6a0cf9780a1963d397957b303928814d565da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5573060ab0d47580cd7b55eab971fbfe0
SHA19442ef2fe3ead1d37d738f2ed7f5a5cec4a23994
SHA2560d52a6d032be18f92a79e6639f6cfc0d57af30116bf78bd38e898073e90d9165
SHA5122aae2ed811dfaf35058c5715d5f0df153858eb8f78a9453c2836ec87351ca974164bce9e3a3ce1580f05b43ce95def1d2439d567ec3c538601f44e4cf46486a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50efb0c712f46761bf17347518d374d7b
SHA1ba06dce061ab833948e3baa95019bb116cdffe09
SHA256a2c8bc5716f7bfda9cd3288b47772889b852464022f23093ef6ec2f66673e9b1
SHA5127ad4804b817b676fc22c4147f0ef59023113b739fd58a169d6c5a8238fe0127f3e80b42682a8797e05dfa35ee356b0e940a630962b5356169c17701ead39a518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad56995c333fe24933afca01365f54fb
SHA1ada6a125a5920ce5a1b27d604c0d8e448f6d81bc
SHA256637995a8870125b9f6d8bd7bae97101d64ccbec2759c7691c05365c16933e430
SHA5129bffc1eacdad303673ba21b424fd4877eed0b03d0fd35ee32af89ac4742da8414f63c894f20c6cafc56b0cba5dc66aee5f8028ac374321599c594febf66b599a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c9b9cb35c40ffdbcbcfae13f2992d31
SHA1c3699ebd49f7ce102d5425088ff54cf5a76c7569
SHA256b674754db91470e85b43cb22c23c7bf960acc58b0aef7b10c482948eb2752a71
SHA512315df5b8eaef96ceb0dcb2d46287b12407efe1a8a5fec82aea85900739a58f2ea8fda389edb6eadbcf2eaade3612a6353795295542079236f98abb1b0b324187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe50e1a248693421bf683bad3546f69
SHA1fb9e0dc80a2e1fb51bf52ae2e166dc29e899de41
SHA2569534395d4b23d74e87f2ab3de73b588ff88f75c08052de2543ebae583e3b393b
SHA512c30f0d7c61a6e8367207e3ab7ed9f204550b234a66344eaf37c0ceb466383339aaa93e4005a3df0d478cf276626f92f0af0c2ba91a1757e9a155a3090c816c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f33bede4228a4fd739e2bec1777eede8
SHA1d637fad6bf345c642cff804f589027fe1e765844
SHA2569ac68ff3bef05026e58741646cf4dd798e463cf258a7f9803d5facc7005d790f
SHA512cfceaea82418442988ab75743948243165eaf85463352c52a555a45e847a75a1c6b0d378e15ec7b64e6861f3870478b87ce7fabd6b1a30c55f7d40ed9ff4db02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d1a8bd04e2a43dd0706d1ae7852a44b
SHA17e82b9d7b108827443e3488ea1834c07632ba9c6
SHA256b88dc3a815af1fd23ede77a87111907cbf6654cf5a52c396aa675d5c6daf9f4c
SHA512c85afff15218e21e853086d625cb0311c6b5fd1900d48ecf5384320f1453cb5f103c70d5e373610aaea6afef1cb3bb60d816ce54c51c9e82713e2d5e823ec69e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e247d78c7145cba9a13d8420fcf223a
SHA17157f0c190f8298b497963bf56981296fab18fc6
SHA256a9180fb45448e21181f4cb12a18125f197887aefa007237034024bb53f7f1b4a
SHA5126325a151fab7bb78bd341f6b86b7cf065c73ad82ce576a3a389439e47f189c41fd393b14c2a74301c3b82bd45de579ec94504497ba1ee4bd1d1dd083691e8404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bedb7c6b6f7c331994e4de66fb6c690b
SHA186bbd2f6bb2d51c4d439808f6540ea9ae654020b
SHA256982b59e1bb6d03b406ea3e86c167c7fe72626fdcbdfebab0f3f8c5aa325d057f
SHA5129ea412a6d48e5d19daafcba54813c752fe2d37854c0a77b6910cb641f00e3a6bfec915a2b4fefd3ff8f71671fe86039dcdbfaa939d814128a432a1dc31adebf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b80b16815a26c9f9cc0ae9fc3c068b3d
SHA127d44efa44639dc5485885b0c67b4e4697bdfb1e
SHA25612496c3156873d8c599d75f698bad8f5f0ac73e194e3f2350a423aa0ab9c546a
SHA512fcf3187473de142577b2bc4bbbac3b659fa55d29d4be016692a74ea416384e1ccb9ce0b88e8f252383a5efb131431ced5ec53f7dc5823b8c31a43649e1fcc0cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fc5059d4d85947073c7f2807587f135
SHA1a7b9407838dcab4ff559a8c184dc635c08a16ed2
SHA256daa9bb856ff3f8abde64db9375a049b9d3db06e9355adb58515a100d09471915
SHA5129790a5ef5e16eb689e37c71ebbe800fac1d41bbc508a9f1d0215a8d8cfb5299510525e2037b5baf8e80ea0ed6fe5cf142d258c3badbda53186609b0e014e3f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c6565b36a63b360eb1281a0ad019c9
SHA15703d39b156743e18c536513635a2d4c670a32fd
SHA25695e2b9d566ee7d8b11892e45067ea56be23701b3a3f1d8f68b00b406b23fb815
SHA51292eff8435e4dfd55bc3eac55689c1044e655687d6e892b4edd11b7807b835183ecc28c69e3ec26984dd5a0ad6b5f1a50cd081fb560822e92fb4ff7816cb59842
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b