Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:21
Static task
static1
Behavioral task
behavioral1
Sample
eaa95ec932ca78a5ce91b0858bad1ce6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa95ec932ca78a5ce91b0858bad1ce6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa95ec932ca78a5ce91b0858bad1ce6_JaffaCakes118.html
-
Size
8KB
-
MD5
eaa95ec932ca78a5ce91b0858bad1ce6
-
SHA1
8638ced2d3c82a06502431abcaeb1202fc3dbc52
-
SHA256
ca573aded9bcc843910c9f3cb58c1cf9d6031a3d1ce99234d4b0f1411dab74bd
-
SHA512
5191c4b1f3d7f468e1be90cd64387c4695c9a34e35019796bd1c49b5ecac1a0e195563b169e4d0ca2c226724e24527b4a9b6c1752b616afe36551f2c5cb1836f
-
SSDEEP
96:uzVs+ux7xHLLY1k9o84d12ef7CSTUdzfSxG6MURT2/13pX4m6WHXCmCGq8k/lBcD:csz7xHAYS/TRTg5o3b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{06773531-7647-11EF-BA5A-5EE01BAFE073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000006c7e004483a7d895e73a5f00205bfdf2a9353b7dd3b6aaca0a01c0cc6ffde2d8000000000e8000000002000020000000c0ee47fc78cd90171610bc2de1e61e338423cf87fbe741b8e85da05d51a1f26a200000002fa0e53d1ab98f058f06253eefbb4c1dfad2a7c829bc2bf4ce79f542e4e720a440000000d155cc22037019fc03c358703487bbeed26a506b91b9093fb3531cfbf51109cf7431118d19e49001f3eed167b3aeb935ac2a391218ef4724855d256ab325b7b7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432885157" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20320edd530adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000000d68f1ae1736bb087b70eba18925fded0eefc329bbe536c7b3e05b65d3cafd4e000000000e800000000200002000000065069a28e37c4b6f003b410553cf761d5acc267bede668b50b637d02999ec12290000000a4146e5c890dcbbb73e021a7a8d0942e238396afb4493d3938ab132546d85f4fbb5e5be9df2df111f6c3d9d6b6feef7842e13703e3b4cb938220f4fa26deed350bc9d244e37ab450c8762ff2512ad1dc2464dec5e3e7e3dead1036e54eda6c6a1f77be180abdc1fa1cc6441303f1c54b3f61f2333832e493d3b7eea33870cca53868895ab37c954522424af557c6c4c6400000002e950e8f72ce16defb1ee5e5400868503d593567285321213348064b85ed2414de87f960b6ad309422fd93e23044ed307361f0922b69238f30d3f8af084dcdf0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1820 iexplore.exe 1820 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2840 1820 iexplore.exe 28 PID 1820 wrote to memory of 2840 1820 iexplore.exe 28 PID 1820 wrote to memory of 2840 1820 iexplore.exe 28 PID 1820 wrote to memory of 2840 1820 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa95ec932ca78a5ce91b0858bad1ce6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca22a1f526c2527e7a2a8512e49db708
SHA14f6223cff309c17a8a6a70f224c317fb17bed1d1
SHA2565e9cf87a9f1e56af35def30839ec6bdb9a2cf98978b3861cc1312518a77da6db
SHA5125c28c4de0defb4512e1e390824b9cb44906cd36bc6750315a75dd70790f48dd2814669232d5a5aee936b32d0ebf8540d12d3706aa5c8658dc5909f49219dc138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5330e65702246fdbaa0a8d033c011a66e
SHA18f86e9c7f0af9cf5e4f70502cb62d8106a428aff
SHA256c4b4310cf4714a3cc780dc1bed6257968a5615e4d608091a39204836141b7737
SHA512fe9ef2039ea1504f4abf582f6a66e09bad870196c88a48850e2140534566d48f2a7194673346b8277dbd8fa110ac8fc7a99df2e2796ca2d086154f965214672b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5ed671c06b9181167bdbdc776c17d5f
SHA1d764fd6ccd21613e0a8161c2f8f506e01d8b3e92
SHA25657a47c9c4a36973804c564b9ede697bb6358e2ddaeb55b1afd7b5139756e90a7
SHA51245d0c0acfa945ab082b3a6fcbecc59a36c17aaf8322a49f0e1e7f68bcfe0ce4143d79a04d4669361d472ab7ff388839996f780853c9afae22faea83487458e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5980cb7aa489322d9df0e87e3e33e0a05
SHA1e42f2ba8891c1cae9359d719b550b0ea3cdfb4ee
SHA256a415f2c8a09af98359e71fcab4d581c5783236428444ab763477d59d1ab7106c
SHA5124f69c8c74752d5c64f3d677c7f47e431bc9dac1b556ad6ea6076e4b07504da346287936c93f914b6753130d1fa1dff590717f14d110cfac98c0198aee6e40ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586434dc42168149997d1e55e3fa0ef0d
SHA1814ca3b5f686acdfeabc1594dd3c8c90409fb9c2
SHA256d5443693a86aac8a1d4207f55e1c6623f0f0a3c6dcd6de599cce5dded4d4c4c7
SHA51282c5e2eea8cc8eb30a592e6f0ee62dfa42d74b0b03ff6157384271901edc595810a404819aad9a29fc0e48e6102976d5b8339aeffc3f003a746d174880f745cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55457978d069055639ad76d787edc9d1d
SHA15d3f7aa4c0579f1d5b48249bf45bba49d4b8d9db
SHA256eb84a2cd790cf6d1aa71b0c14c74534f39423041c7c9f42f43c9ff8e9dbd4ec8
SHA5124fdf1536439c39f76c8a07e0a75f2fd5ee7a21a20800b188584244092f45c5bd7b63638190a0116f015e171f65761660af3afa2e4e64ed18241cf8b6f2e89b12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064427949b3c45306fd529f73f192f73
SHA18b6f4c7d641a6f7b06b68e90b80517628ee8e8f8
SHA25681b3c94b5e60887e732645a85cb81a6cd48c8ffb4a16c8b8938a0e9f5f5bce0d
SHA5125c57437e60b6605260f298da760ff6dae321bf18abcc241a1d005afe5bb08b1cae0b051f6ff4db46dc3b77d0b3c0426f721480086b6820d1d7cd8b6e26228a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9c565f4a1d08c74c25885a7a389642b
SHA1afafe93c4997e06e1a654212e9074b9c8b805203
SHA25682c298e81db3e79c648836febd0fbd85940d3017b5c57d4eba7d514477ad6205
SHA512f41bec41a4806f012ceb189d71807575d9f441c3c7496acf6b196ed367ed5b63d7e50cdc15f9d85d5acbc6372b1c8bf477b92624ddf4c0315af70fc8efa48f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595045572c9e5407956cb807608a96f60
SHA1d60ae62131767e9835a97475e4f6f932d5580e8d
SHA256b6079a39d12b17765afb006b8f396ad0260af07b8ed881bb7a4c97e619c82680
SHA512a9d7da83306dfed7813baa35a4bae816f6d73219eec7298717eaa33c9ce5ddd3fd66ca314e45f0000635d280c3950ea65b41914701d53e53656ce6d8c0d042b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1ca12b8231f418e3327fb3d33a2724a
SHA1852a7f4d309bdfccfe18a9c5e3cf3f5649386a29
SHA256d2019fee627a1c3d04ef8d15d3050301c04bb6b4963c6029a6bf2fa3f4715c07
SHA512291c2be3f7dae2e1b3c940884c6aac05d14acf4704269cc5c869ca52825b482674386d663894a78a3e69213bf0c80ff694d68928f87cdfac138a3e8b161279f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516dc49591037e9e4fd2bed4bb29f751d
SHA160bcd67cc8dbe2626adde645f4c8f8f413b90e7a
SHA25640a0cb428c787fd8f5616d3eeba64246574322988846a26c700894efe905c4fa
SHA5129e529183bc8ae6026b226de2a0268594c0c6c23e8dcf69ef3c7bf6983f6188cd7a14417b2e7c19ff6992d0fb49b21b88dce236665ba778a2d98813327623d6ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4ce0e76abf5a7aab1f5ae05193520a5
SHA1729d3bf71d15c4d8d67d846b23a868550bc368c7
SHA2564edaa9d5de6ff8eaeedc8d08dd2349f16157a625bd04a038a5e8315d3cd13ee5
SHA51205bcedc27cc49c0df36c8e8bdc236d5df0190752534cbd088d18b8a3607a59eeeb489a51b252b79a668aff0bd1d283534c769b4f32fa5611c8a4a160ddd25367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540c440ca56967c1c3f51195af98674b9
SHA1cb5e848be90162973417ae101ec09e3c5240bb69
SHA2568f3112e5553acf1d293e96dfdd5dccd68f21cef4643207bacd53332c26d30b72
SHA5122e8f934d8a2e4f8cfd10f9899faebacae909f6aec754544d54786efe78ecfcd38ab6e2e3606c8f9e7b2fd090df6354a3bee08e937c47ad387cc376ba591800a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52210238d71a91f1d0fe41a6c0dba8dd9
SHA1e83817a97ce54c65e2d78462913137601916a496
SHA256235ae5fd120e07764b82f1c5cc28c52385e9f6b53550edf19a1aa3fbf2ab07e4
SHA5125002c5e88fcfc20a59ecc3ec19d98e0868260397cfef7ba99079c722e2d1188aa68ef77cf414cf7d419a30abdbfb8109f104e64ccb82cc9d1009f5b7de5a1c29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9050eebcdaf0d580870ea0abdd132fe
SHA11c887d18e66a2164320bba8f6e2530f98707998d
SHA2568b4ec3de8ff1c082679e1e5277e8a30f90a1badb20cc9e6b5544ec6aed611be1
SHA512776edfe6b98102c37a80d6b74cd95a570ac8e91da005bc358f97890de1be29b21f150d0b99bd310d445dab4f015724db62a243f2842e4ca1ab7698f8e54dd550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c9af81a95d606e4dd189e73d9c26cb5
SHA149d0089b75c5bc8ff6631e39e618e3a2c3405b76
SHA256ee29f1b9d370695237c7c10a094246908f0b641068424cfe0a58c1a8fcab0d42
SHA512dda8cef43d72104c2860f137d7e1627394776c9ef94b197af6f33bb5e8926a7275ccb8ecec2a5fec625115f74c3af460f7c4586151d48f961aad22cfcd64da28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ae697de0ac33a62538ff66c969b105
SHA1800cd0538472603b3fdae317bc0b4a08452ba345
SHA25684af17d688e91d71d01ab0d8cb88d374257c34918e337f8ff4850e89d1eceb78
SHA512ca97458c5dc9f845b1c5f5b9221db190945e71632c84b62015927cbf06e5cf47408259923f5126cd5d2c405f501239f11a32eb0858450db8f22e4b134c50b811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f69fea7cc8de8c9911c5f78d8672e33d
SHA1ac702ce274751ef4949616157e093161933f8d6b
SHA256a71327396fe4539efa3666420852217bd45913af73bc8e27956e0a95f87243a5
SHA51223083d52ac038d813938869baacecfc8539b06d4a1e4b5fe7a81177507dd115d206d82a08d578bbed008399fa950d06191ff1abf8504ef4648bfaff6ac916960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5561a459242111048511a553d0ce820aa
SHA18b696afec705887dfc60edfac1aa046c8c5169dd
SHA256fa7d3eaf90e8d58d724249e9d2dd29bd4a58843563800a4061d7d38e0faf4523
SHA512fc6b2fed0321bc9f89d06290056b3ac87234cf4d164d1b122bf3eded27017e26e88a66880292678accda2bbe8de474a554a0221b9a67a42dd9a8019a1cea0a09
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b