Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
ea83b58a8b858aaca6f4e284de7d1eeb_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ea83b58a8b858aaca6f4e284de7d1eeb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea83b58a8b858aaca6f4e284de7d1eeb_JaffaCakes118.html
-
Size
460KB
-
MD5
ea83b58a8b858aaca6f4e284de7d1eeb
-
SHA1
af0ffe9b690632c665da4177379401dbc4cf000e
-
SHA256
da731a1710c728cc52fafb8453b9eb84aa132611c09ac24ef23e5bd6125a1435
-
SHA512
15201ee08bc0a7e7962bfb96f64fa7ca6005c581f2b527cf2a7c99460e7eaed105af2498b44f45f7e55c786c25ef6d6d35217b9bfb1c4c564a65169a75d8e6e4
-
SSDEEP
6144:SDsMYod+X3oI+YvQ+sMYod+X3oI+YnsMYod+X3oI+YLsMYod+X3oI+YQ:Y5d+X335d+X3t5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000034cb04c949d742f5eb6d014c519799f796e4161d5a07c54abcb853855495ea8d000000000e80000000020000200000002a11a1092fd943361e54e7528233ddf6b217e475e36e80bd7b988015a95b8e0b90000000f7addf455b87bc158ea038a0f7bf0fb018d94fc20ade01c3a46571e8fe7fe4c76d4f4c8a9de47cc75a923ac5594834c18f4956ad8a280329b6cfb6a4caba1a6bc1028718d4ee2d28c44281c4502003eb2f352ef85370815dc34d8881c5c7fa3a0e59e0b3d5260e1b7f0cec00ede527ba320f97c77d68ede3eca1b827560e710d117ca60c2b4c584ddd03d749a8bb480040000000946ae8fc3f9e24e95cecf864dc375a7c7b6644533da44649443554dc57288a86d0b456a13d4d0622445b1ff4cc14547dc473f9d2fa29112e7929e705bb733d34 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000fa29b6d573adc07115455d6b21f818c22d325c859478ae3c3c020299fa96ac31000000000e8000000002000020000000474655147e04f4c00de2da00543e1543c68dc0d13d268edf7b298d3d2be460d52000000031444acd0dc3530d68d973b04059e4cc1dc43ed5d6b7f0e42893d9cddb01e83140000000c6d2fa876746e087260eb2a827dc360748fbf82ef7af588a60d2cd3571e668abc1946e9624c53ff97f0bfb4e1bb45dbc6df759bfdfa3d35a8e3c166e9e09f2d3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0494885450adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB2641C1-7638-11EF-9257-F6C828CC4EA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432878991" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2144 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2144 iexplore.exe 2144 iexplore.exe 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2144 wrote to memory of 1564 2144 iexplore.exe 30 PID 2144 wrote to memory of 1564 2144 iexplore.exe 30 PID 2144 wrote to memory of 1564 2144 iexplore.exe 30 PID 2144 wrote to memory of 1564 2144 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea83b58a8b858aaca6f4e284de7d1eeb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2144 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bec774bdc00e6d19250fbba3427898b6
SHA14f6dee75cd8e07fd3ac3546df8c066b70af55009
SHA2568760f96d8672413ff83c5e694c178de4deca054f76c251ccefdc6a371e025107
SHA512672364e082d9f57847da1816720a33ccf3b6d2f97d47c97ed52de896532a0c93ebcd9ae5dc489dbc54dedefab9f861685ae27f7426af1aed0eaab5610982ae3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec225a20679b5b48651d64366ee8c2f
SHA1dfc929ed451929e2cb55a6aaa6a2c3174508fbd8
SHA256e42f91d27c4371c0acc4a78594c4b31602b0d6d6b95ec4731591d35d83fab869
SHA5129a85dfd08cd1ffcfe357506976b67796e9ca308a38457ba0a766de81757e45bb4416a9b49e8aa0a6aa7f9dfce0d967ba285f0c271e912969a3bd0e250d63d2cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5102f33d5a5381a4e468796a26f907c
SHA1252a20e66678918b5ab565b058c8c8cc9b00e03c
SHA256a0825ab442c37fbf01ce9b4bd369e6c8bff9a8865a58978112ffd56905109de6
SHA5122085eb80985471876af0ee2d1a5d3b5afc4ae73c4ada007d1838ced17fc00c31da6f87b3435446082270d92275fa35965e5a9d327db2e9a60a29504cbd1d138a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584c5267bc622ceaaf13eabb1abe8937f
SHA11910eb4e44ef56cf4c0c4647329042792283e805
SHA25621832592a999c7506380b3e2c6376fb8b8e487dd58b38791a75666e48bf9d27c
SHA51223b3024fca47294c730b308798822c2a63fe6fce590d0ec4401c615ccef92fcc674813ce88768bcb783e7cc720924dd2c2bab4ebceb8cd3b0a2b4f63e40a8e85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520a00a1fad907e70882b498aaa5d1562
SHA15f03ebd37029dbbd5b42592fcdc1e0dbd0e48e0c
SHA25641c93763b1c2ebe566dfa035c8fb3311bc22a555d53a78825b96cdce2a82d775
SHA512f7c226f0689064bf51399b5656d7f6b679062ce757c6516c78e130f0e5c260085f12aa4498c59fe963d265131e9d58e1375747c99be58abda74c0a811d54e78b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f03d0e2d75604ed60a9783cc08636d30
SHA1a4edf12e313419773ffc14e3022fd20da8c8ed80
SHA2560e1aa4ef85b1330fe70487f69e13247cf372c24a86d8b67f5f831e682de30c2f
SHA512f0ff315b6aebbbc760814c2097a5b5302ee72eb16d9d09d4037297347d5a2db86610fcd2f41aa0b9692585466b240f815fa80cd93835f307d35d21d65a725331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55958183f38fe112608dbea35a6593fe0
SHA1ded78d3d4c0794a8f60a257ed5a5f822ae7d1017
SHA2569ed9d89a79d6ac6c508a37cb898fdc76e646aeafa7ac7d0be5e252158ee29d0a
SHA51235337e4870a4ad19a78fc8e15764b64c05c03d0a77a5b452247906553fff51e2b9e013edcae243d5bb59784db805d93c5e5c8a7f9056c6fb6623ea47a2a26dc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5874276fe95e0865fa80ec1dd7c5356cb
SHA1f7b73fa7be9135e7fef9b46735881455191917a8
SHA25651049ffc19c7ead47b6cce5135d6820346a3fd1866301198f1274740a7a6527b
SHA512ba653c430fb24246db820d6ac262bb3af341f20d81a14daffa4eeac069288d61479311f6d4114effd982b4f20b8ab2fca68e001caf879492d95a638c2b34970a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bd914a4e4c4ce6f428c8a4e6e3ec782
SHA1ed922996b0fb28dd8f8d94e7da59d9139bb29301
SHA25666eaeee6c14a377ac98b53b2934383e0fa38cf7a3e9d9604581e444d83e3875e
SHA51250bfa8accfbc89c36521f55061fe60639a731e3ef4ff286b65ed397d4624e54453836bb11291902fc321052b0807748cdc0b6ac97435a2e3b17e686df6329353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6502adc499480c99632ac2bbf8cb453
SHA1a694b2cd4f9f3e23369b1358c9140ff6ab5757d9
SHA2568f149c9449b339cb6b00e296fb6911435eb4ed32b91f1ebd6ddeccc7916f85e5
SHA5122ee8e319e5406af7aceda318168480a9926e601d94e43f61361558fd2d04a3aea30e81b6360a8923b45a09c4a6c87da3fac6fb0ba93cb3d345d0064b147eec1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fead5f0b6d1c7f78f058a2d1698a8bc
SHA17f14ee19ccbe06d07c1114d7bab6bcdb4c0fbf3b
SHA25665a87440de59aaf8ce9a53d980fc49ebc50761ba21bfa51399035445041a9439
SHA5123b6018eb0cadb6d70f37786fd2ca0a46e7c4202196229ac5235cdf1a8772510a43ed822971a1154c45b2597ea33b715836f6d17c0a64b1388fac3912376bafe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b51a96fb2d6fde7e42660f6ed3c23fa7
SHA171e6f9b4e8260bb8cda6a695b630ed9a02c5d9b9
SHA2566b12705e98cfee9c5cfb2fb3465afdc46d3038162ff116252fd4c0971742472a
SHA512853aa3bed5470b97a61d44b59986e19d0aa53aaee33fb92832b27b34bc709191c6e62783f6c8d5f87bc5762f5d40019afbf9f575695c4020d8373c730ebcaf15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fdec476a7998dc5e13f366d8c3b7541
SHA1f516fde94de4bd6bca4021fef0bc8d5d2c66e61a
SHA256d556d24f5444dfb9fe408ea893b0dfca5adfcd49bddebec0d1dc3cb03da5da2c
SHA512eeceb507f3d7f74c08fddd3d069d00a9bf0e07b4dfe7abd990aea3091d90c33e69214deca7b055edcc81780f7d0d350f78234ba444f9faa411f8d98507137d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6f6775a18b938be0947cd96bee34d45
SHA122c1b8c2da5db2edaab838a235a9e2d69e33a361
SHA256bd021566f52cffbe9fc72a2075b57d9050232298571146cd89d2e420a8cbe828
SHA512fa5bb67422d79079868b85850693d3703461b3047bce3b596a883c7e8e25901a32ebaa125e5e0e6e65049f0e001a2ce318469a6f2db61c08abbf502c8af48057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fbe40bc6bc55e1c1d4ab4fecdc9bee8
SHA104d7ee9c703be18369764fd5ee848d5744579717
SHA256b954684e863b7428fe3907bc31c9461ea41effcb64534fba19f5e647fdcc303f
SHA51201b34bbb74166f470f52b0684b5ca0ffbf0965f41823877b330646e4586283957f17bcfc69342436a3ade8cab3d51abd0405e81712ba960597d5a4a5d156c133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c18035dc1cc351e6ccfd06c1349f07c5
SHA14952a369bb1c2df36a8aa3af42882c25f5e7adac
SHA25610a96d7abc7fcaefef55434b2ae1115f51012e46f734aa2d703cec2277e6ea01
SHA512a913757f9668fef3d00f2f477140b6741e838e91759d99c385dbb06ac7f8737f22289dfae3a1708ee82c537e78a1059319f789e08d84db1a2dd831b6621f7b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8e60bdfb45c12368af1d46f32639172
SHA13c8f38b5669eb18d225c73c548e4f2a821133252
SHA25630cfb816677b6dc2861ee7886c589158f6778f62f8fa72432b4a1feb2f98d320
SHA512929ae1968176168303613f3a3e722341d69ee9fd051e292d630a1b963c8138502a14943414319359a4aa373687853dff33a62e4b8314462c0a6174e5eae5481d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e9a415bea4f091be98dbfa7ed692c0e
SHA141785e9e8edcb854a375b277e7dfe98b9e26af52
SHA256252c801d0e49dd42a391adc663817aa80516e2558e33310ec138db0a9b9377eb
SHA51287df27fb4d5d54cf7407fbd5968601564048c206054d8932efa676620ab0b291f4327579cda8853ffa62d3e74023a312f29c930034967b6d73dd007e573fd346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e53c229248b348af1ffe07f14d4ca100
SHA1347afa0c48251d2834d63dfd225bbce323203963
SHA256716e98120165de9fbc7aac3e0253fbddc1724ea7912867ff0a0246032168f6de
SHA5121b7d555cece88183643e8b8e2fbd68d13f8f7996011070af15e353243307a67d09d40f44330aac6046d31df9f89fa526ab4888607337951768b2f39e83714eac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b