Analysis
-
max time kernel
138s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 01:24
Static task
static1
Behavioral task
behavioral1
Sample
dd670671578d9958a4641e8bc3072b73_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd670671578d9958a4641e8bc3072b73_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd670671578d9958a4641e8bc3072b73_JaffaCakes118.html
-
Size
214KB
-
MD5
dd670671578d9958a4641e8bc3072b73
-
SHA1
14e874fae748b96d63298f7101e6ac130894c3dd
-
SHA256
2ab1710dddc8df99c8f85f6cd235d26efeadb244cddf219aeaafe8a8f663df24
-
SHA512
48f05027b8eb1d3ff68dd86cbb0d2794abf1c1c7664e2f7d8a1f77caf14aff81d61edcf788f13975150031ca60ca31e7a828b9330a2d971ae97a54a5373257b8
-
SSDEEP
3072:inrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJK:irz9VxLY7iAVLTBQJlK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD303501-716E-11EF-98DB-E29800E22076} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000321cfb2250c79438af56416248fb878438aaae9092342109b76f390bb9269a34000000000e80000000020000200000004292dcb72f05d62a4ec5814c075cc9ff2638aac1b06b9bea50cf6a789557817a2000000053f48e6927900f1ab51c0f5e383d05a4313223ca974107c3aa377ecfb2a235414000000094fee7d9021d56e7044bbf476765388f7556079fec5458a71232aaa53c86d42200591aa7b5cb62146fac26c1cd265c836eeb593b8be862965e11268b72c567a3 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0903ff27b05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432352512" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2520 2000 iexplore.exe 30 PID 2000 wrote to memory of 2520 2000 iexplore.exe 30 PID 2000 wrote to memory of 2520 2000 iexplore.exe 30 PID 2000 wrote to memory of 2520 2000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd670671578d9958a4641e8bc3072b73_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a57ea57a42e0108b50ce55197a2c81a
SHA178ba7da9b7d2344610313227fa1ae153e0452da5
SHA25676f00667d7cab3f39a7e9b29c5193acb1b237740b9e79fa6a6a535295401a2cd
SHA512fa9d974a6109cc6cfd4fd18de1c15228e35da67af7f8f81ec5e8f450e9f512f37d630f506be5b19f8aaaface5f05a48c25f91e0522d69d60b27bde3fabba14a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52193b7466b044f1316bb45f9d81159ac
SHA14aa1ae4ecc522994a45014bfa61ad9a47c40ee13
SHA2564b603771dbf2f74afa391854d7f049a0997a12cd84d944c4e7c78f22e9ee1185
SHA512d84892123976748edc3454be9a227c6d32ef8dfb143c2ecc4e7a3ae6ee4c43b848c129d1f2e1a1c7f53ef411dc1db439b84c6920abc5fe63183bf57b30c350fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab8c35c553bd62340768b83f88ff8dbe
SHA1aa971b1b3e1efe6e6b0232d8ae701bd313348803
SHA2560f1c4ff2d50bc155ce7fc003067328476655e6faeaa39c5519507af12e3e68ac
SHA5121c696f1f9d134c2430efe5241f70f633bc843f1a587f157384b662e424818cb0baf5b3e43019d1851b7fc1159da55dd81954bcc70921a8208cda82bddc349fc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd9ac583fb3cd38bc5bfdcbfda12cc07
SHA1c693b2a1e5c73e3b2d044ad2651dd2c3f8091ff3
SHA2560e46df466be581129f1781932805937f11f47978e3a7510de502a0fb54310022
SHA512ff369a8274cac2a2cbe45dd178c22a6f36f973e27d2238048a46c109076ac811378a19aaf5fc0c5c7bc0a171b19ae2539269ffbcb68385f17345c6154f1a4cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c742d548654ad284ba861e6e66ce56b
SHA13a16fc4c9faa542df309cd75b11e9dd6519f0fc8
SHA25688b189f0eb2b2f6cfd3a8b7608859a25affbf816324c88b7a74de9303c588ecb
SHA512f9ca927d4be152b7d4613906c93e8c72346c89ed149349d557c6bb202eabbe512cebccf021d93293558efa50409156e04dbc8f4db1b7e48b44be73ba94fd76ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2cfbdffc8f8fb2ec22404b59251afd9
SHA1357360365de9727b8b65ffacbb0c6ae2be0f0516
SHA256cfed080fdfef468771ea679b8412e2f854c54c706c7113b8d2bae7104d8606ac
SHA512b41b7c93da4fa1066dfc87590b2d8b9c124e958df2ce76c3c466c8d9f0c4c965ef08bc6fa5843eea8de9ea6ea46a6709010cc1fdbc08fbb8c9a532ae3151c09b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f494a0beac1f877d7af4d779da31bef4
SHA11dca9bdbcbbca4358501cd876a37f6b2b78412c7
SHA256d276b2f9c003a45d8c0a5edbd7aab26bc8721027ab438be5dba7a0cce0bf771f
SHA5125c5063188a36ec8a96888f2273ad4d65ef4f06c37466f452cbb7e28b347fc94e52ac9f11951a7c427e2472d1046a8a5805d348ea577f2097b3421813ae6d4185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac9144401508f233c3feac450d218398
SHA153df1595ccd13520613d817c2893d1a140b5b57a
SHA256c5d871ad6a7bcc3f858781030388624909abe971bbe7e25de988328a0a5da794
SHA512fc2359aa2cfcfa1d7b07c35dbbcc7e4ab1bd7e58d1a7ac462e8c8bbb5cbb19064191e161baff484588d03d063582c0ed8d9bcd5d59c7be3e762b65b9f4d60b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab9c792bbd23c9b53655d75f9e0def9e
SHA1537481e8fc5043de4c34f7b3e0f503e3f1a5e96a
SHA2560807766b2634e49388a6ece00902ab200aeb1d203fad92fe0c0ed432bed5035f
SHA5120b06add864c0ae781b31425385f6890c8cf226259e299609148c2eccbed282a2cdd9d247d39fb437013e63a202e8a3d531d579427008663ae7916eac78d53cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ae59bc1028237e3087a5fbe395545bb
SHA1aef617aeaa613df9693a72dd689d9875226bb7ff
SHA256885b9de2609cb7e195932ba50340ac8c695fb6de1b4f0cc3c9169497cd321b36
SHA51226ce5a28135d9680ceb9bb1478c203de91b3777de36e9cb1adecf01fff3022e0f726d1bec020eb8064542a89121dfa6b99d94aa5df9be961d8819446b4a353d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7388c7ceda5ea7bd907b704c39c8fa5
SHA1f1f27345d75b172754d7d337748473a13a45054a
SHA2565e822c5fcc3bf18e84263994bb597cc5e2547a2b116619c0cd3af0fb9f653778
SHA512e89c479eac6bc753accea3f44ed475bcefcde665061ba5658622f1c187298508bf37f59601455030aade9462a8897d3b8b260958f63bd7c23182724c6c3d2a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584888e6b3693a12e1337bd395eba8ced
SHA163259578a250409247b9730275cdff97d9b21812
SHA2562c35af59441344e540e087a0cce4df031ee8aa589a27a776cc56cac611be7b24
SHA51269eba42818b8fa1c56c394142dc72bac08b5992a003532aba984e6278b11b5e62689934a9ce402343ca133304d5ec854a549ff05545b54f570bfd4053014a798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd69bc444f295de67aba587ff14d4735
SHA131238de923a0138c3544a9a41a5a861fa5d9925f
SHA25612441f956e09c095de2e66b9a255fefb45714491168184880d00c249388ba6fd
SHA512dd5c1efe217a1352d1c9067323c43439be663b10bf6325448b23d6c1a3f254b8eace1ae44faaf240964eb8bea9c5cc02dd01c6e00d6a7de8d35e69da10907ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd3a8d79937ab5fcbef12b422c8c11d8
SHA1bb09fb22ba4eceb6cef1f38e7401594ac278fbe7
SHA256b6f9a151e641efaaeb78ea8af58027f54428f24a9703779fbaeaa21640548191
SHA51210eca3954c587e9847d01c56880410e764865b76c89c8be35104bee2ae605c1f1b6eb937e62c57b0935d0fb749eeacd0249f345e4eed0ae0bc8a42b8a5ae6db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf5838ad5ec063b901eaecd8a1c887c8
SHA1b6f4498cf40895260fa29142c9a05a24d343fd11
SHA2563a265a0b04ec26279d11afdb3f5482a00961b9cda0a03b2052f84f9c335a0ac2
SHA512e3383c2cdabbb7eaecd20627bbe9e0939a3c3bc477badc4e676754aaa7f88c53d3108278687a6242b5ce83ae06c66125d1c88b5822b99b4d9570a887e67ac7ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51546f5f278d39f4113226dffcba679e3
SHA10b752d30b9e7076643a184b2063fa07b0ad9f32d
SHA2561dce5be1cd60ef35bd22c69f6b42d1b31a3e48f738f50ce15a386f64077d41ac
SHA5120cac815e0d9f23fe254bdb19b9bf666d27925b585b17e1085e5ebdca15909302616b6a5efa7eb0ee1fa9cc2c2d731bbe488bae0d9b61bf5bec5fa94769d7277e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539ec5a42ff5b47d068dd019bb9776c2b
SHA122ea0282cd15248cec7a38d69c18488894957b99
SHA2569a0865eb3c3b1fd48113185fe0ab60267f312802c34d9808a50240bd7cdaaabb
SHA512b80e56d41020c2c626d08ce4f492ea02df64a760dd38ad32087f286a93f18cd18147f2c51d655ca2e46294ba89c8d4c25e82579f7e20bf1be69f66339c328c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b72d7afb0311acbb90fdd8b14d1f8f34
SHA1cc95f7984de6fda9f459d9c509d55a65cf4049f3
SHA25628f1c4f91718c5b7dbed5da537d52ad03045871b893e911286130d74dcd363f7
SHA5127a7240a8683bf658f24e8f549949451233862952eab73592ff2c327b77a72d088e577c172f819f878f8a8fbf3aac6eeaa93cab3b68cc24b6493766613802aa9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fafc34521bc2fbd8c7f37a765d6277b
SHA1937e33cd7a4992f9a9496fb758a533ea250ca137
SHA256e17aaa30c6fd0820edc84161ffa84989ed8318e4ddb9d3fbd46a7939f0aaa886
SHA5120ac4adde4eeeefce64495d57a547a9e2eaaf1d81d8fb8ea67d2b683da611643bee362a583e687949e3e748befdfb4aa5622b0347a499f46689e3ffa838bebe4c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b