Analysis
-
max time kernel
137s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
f4f0c9d62276aaee323d610df8dbd1f6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4f0c9d62276aaee323d610df8dbd1f6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f4f0c9d62276aaee323d610df8dbd1f6_JaffaCakes118.html
-
Size
218KB
-
MD5
f4f0c9d62276aaee323d610df8dbd1f6
-
SHA1
38ea5de94dcec039bce3932473b43e17a8681e2d
-
SHA256
d19d1af2540ab412a872e94295f80c79403d1a07a50e8f44a937663f71c8dd99
-
SHA512
740c7c921801cb80da5522042c87a917d32c70ae32cd53ec38195f6f65dcb1df6547ae180275f230230c8434b4f8a749a8cdc39589bdb6f9dd3259f951114d89
-
SSDEEP
3072:SSvr2KnjJoq7pyfkMY+BES09JXAnyrZalI+YQ:SArpnFb7MsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433391983" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12362D41-7AE3-11EF-9BF0-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c08a3f26f00edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000a932ff87f8e1eb230ff217f3e0dd0e16ec2615177ada9e6acacb1910bb4d505e000000000e800000000200002000000071822b35826039a09b78b143a84b6d2d23931dc01c94aba2856183381b1b109f20000000743c3371f6e74376d00b4b02026bc2a79cad528f03ed76298c387cab33cc2bd840000000e94f90ceb105824032c4e1e0975b93ec16adcc17ab3efbedfe0252ddf2a99cd1055b95f84f6fe66aae5c5e9ae9fad6b5307b873f58ec140746b1181671965a06 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1716 iexplore.exe 1716 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2640 1716 iexplore.exe 28 PID 1716 wrote to memory of 2640 1716 iexplore.exe 28 PID 1716 wrote to memory of 2640 1716 iexplore.exe 28 PID 1716 wrote to memory of 2640 1716 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f4f0c9d62276aaee323d610df8dbd1f6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc70575c8f324501e4b0bc89bc790736
SHA11a965156046fff52b07f5646d7d3c05e617ed7db
SHA25624951027c137db8ce8f4152f9a8cb2cede61c1d484502b6e540eedf6bc9741eb
SHA512c9df422d987f1ae2baf1e4dd6357efad3fd77d573d4c048e40be559cf0d455592efe39ff1649de8575e7186fc14ba5a5bd509baf49a200ef47f80dd21ef83694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8bb67ae08aa880fec0a5557b539eb2b
SHA15f250bb8e433f01cc9cac00ee7a7a1a39e6937c7
SHA256b4fb6a3d9afa40c266b2b63c367f4c05ed4035bca1d7cfedf4a5719fa25d48d2
SHA5124827e44bcbd1771ff68114b2c4d465f08a32c9be13eaf3431e27a5e0dd23b18f75bcc46ae028c2a1590e6322e0ad1fb00d6617c6dd63ee144823a52453869f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2f1b0abc9204da88d1911e84693409b
SHA14910ed718ebce5adcb8c4dd1630a0b1e5e142ae5
SHA2569f9f0fa876522f955b18fdad93d05da78359d7dd12b9fb89f6915c6dec8b0f8f
SHA512c5b9a870a16be84988a00295fa7dd463322975cdab2a98be28200ee74a5313a9524e7721e64baa476c175cfb6093c17d6e3450da472814039a45d85b58c1e96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9af292dd1d8c3b06f93f6be2816a729
SHA154344bc1183a0d366d6b63a62f4695ead7a5f912
SHA2567f404dd5133a35cb9c9cbe058ee84c6610d02c351fded00c444dee2e655f6731
SHA512afddf5295c6e45d15d4b3441043062b0165eb2a5f8111d91430d6d5610cb8664055fca56dcaf64960c4c218c897c22b2a20f99b327ed73c028db9f951c9f2a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5641641dc5363cfa7b4b0856498498a0c
SHA17c7c708ca341204d7a54e6008c26cd0b1b43f97a
SHA2567ade0295df3324687583a3c6dd9edb3163df50fa06b8bbcd91a82cf1ed09e925
SHA51289fcd0f4af5817b4557c1ac6e00ebe889eaae39601d142351176d631933b483d2586b75f59dfcdae85d89acdc064ab9648b7f69655513bc62f235b9d417c26db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564419fa2aee17b0bb22f1b23b1079448
SHA192e94f3af4a5a28a5b292e04badf70766a497eed
SHA256c6322bd92a2a78150ccbbf6f40df7b036958d42aa90f101a1a033a4e7033c87e
SHA51207fd57022a68dbe1e0403ae7565762cf2a75622c3192009140a1f8fe3bdc325d9cbb96f6caf1c45c534a143ce890ae662a3ba47f5ef116e74f03f8c55028658a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff023cf00fb86bf7ade4c390a1d4e56f
SHA125d730a300eeaca1aec6a51ebf565fd0760c4eb3
SHA2565cabb020789b6ac07132ce394bb468edfaf8c42e70c84dad7af78aeb570056de
SHA512096926e5362581f8a42a838c2c3d8674980d245047b020442f12091c8f94fe948372ae72f68cf1bf02d7371aa4ae640f4a37df4990d5525b8306f45d4e8a0359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4b8162e1cb843578d1ac91138af4166
SHA1a106a9c715d1a695bebe3163fdb6db75f5116c56
SHA2565de6295bf6045d06bab00d0221b5dbcca1ac65ff393e1fa7cf9de46f413161d7
SHA5127324243e4ec3ca0f3a9857d4b7198af2f381df636382d290d742dd3891b26229ee3a6571f6ddee2ea3711b288784a58e47a468db71f2462abd7dd0886d708e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5219056e384574e5b53a07dad46d855ae
SHA19f6ba5f08177fe1e8dcfd3a55359b15d26ed28e0
SHA25694c2eb70ee9d8007fae635fc70d9bbda03446fac574fab3f671da45fd8ff07f3
SHA512ca7ad54482154353d32800b9c0500624e4ab9f33b937d9409bceea0a1344a5c6b3a6c9133457bff79bbf012b1ac7fbaaf55105f3ff83448d75c9084942082485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcf13e17fb9eba8f1c4ee238134eabff
SHA1d715be7a40114aa6a9bdeedccdaa6ab8c69eef05
SHA256e59ef800ed1a86b78c349bb433506a517df85a7a0ee5e895ff0160db1ac5aa55
SHA5127322d922ded07c01c017ef2ac4b05a1977996fa097c0beaca819e9b8393594f8968f754ce4e13a43e9f20dc3e1282a1b951ee9fddc9c51d8ca2cb07263151f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6f67ce84fb4aec548fb8c9dab1433ba
SHA1debcdaebd0fd63769f2c040abe4be2033fc24074
SHA2566337d1c9f8a5949018111e4a79c7eb350273ae549f74844643f7e609cdc30761
SHA5125c48bc5dc96b32139a72c2b14df053937a79c89cb0300513b3dc7b4063b1a216f22bcec128b521b17b34da488b7d948a319085fd25d9eb9c7604e36e286bad2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a9e4b1f5ce43086c0203cda678b56a5
SHA135dfa79da2fa0b8bf6e60cad86a7c1e1434f4002
SHA256bff9f076dcaa33c000eecf79001a9d89ca136713c80856011b2819139492b10e
SHA5124c58d169077b77e8ce51a9fb3a9867ac9ae348a3376a4e42ccccf06aa39c9d11165f071189f9857d014ccd6fb132e3da83bdddbf4f9b1969cb67a1223cc7baf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5df66c504b5da3851639dfc582affcf
SHA1d057ba2c3a9f0c5f29c6f77c27c63fc10056bf6b
SHA256ab8ac2f0efbfdc9adec3a5737808de39db2b05ceb566ecd99794d810ecc9c3e1
SHA5125654816c2f9a0f69560eede3b34213127fbac4da30632a1384128959e70261c4044f37ff437b9e8669503ba4a1ac8c1aabacbfc18086142a5e78f9f9822e5d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8183e7de9e1c0e7d3f075b8da48adec
SHA1a200e5c593e7624b0a63413b8fd35712e349602f
SHA256a71f84bfae5fe1bb9f2b2ab5e9a8b1b5f830166372d3384a8495219a453e8fe1
SHA512c6df74c77744fc3fe25c6bd47cb5910c235e8325286b13fe9fa10f0bb39d0134ecc5ca911e0bca078e20af85dcb833abb0ba2ec14e319344d18eb86b1b1c2e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a6cbda4102504a12652372ffbffb84b
SHA158f788a2b6bd15f7db55c9e9e8ef13b9907d917e
SHA25645855ab05bb229faade00a681dadd25b28ea7f825edcc72d6bf3dad143451b8c
SHA5125b03912615c4e6c1b005e0457a711fc68bd0a229b0c95e72b225c33f6db6f24db730b1473ca5a8359c4bb4cc2516e66b127abec2cf7ca290779770da2993d8be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5433702edaa752e17ed0bc1ad47806466
SHA161a6c2bc6e4376e9f066fdefe5589d5a446fffdd
SHA2565c7285cf9cc8b1ee7341c9122c5ad693ece2b502b285425d38e3243c3a4c27f1
SHA51271454daf785d4bd873da8a263bd2d2d628e902c46ece397d7eb29e92ee1b2fbe2822e1851f980431836f324198ee6918da7d876796cafd39e7f59da9f80bc355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57530640e4579202e2d2c953ffc60391a
SHA1defb17ab9318190ee1fe7a7d3a57b1ffe6e09184
SHA25667c0cda3c3ff39ba8ec32a11fa938c6a8bcc07a80be36b5790ed1efc2ad9dbc8
SHA51231168a48de2b9990a564a6bbdc853e8033d862e26ba923d1bcc8cd8c5731bb323d0c4b8497f71ed7c76f3cbece7710131789f8e08cdaaa1200b7d117db442057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5880abf200a43dc68a4d56a200bfe919a
SHA10d5508672713c997d150c99421adc2107f5dd14d
SHA256c622b69c051899cf9215c84554c9c7cf36e2bd84e215b71777104fb0ede3255f
SHA512b6e74f49e61488e9e1e3a1e5a46c85f0a292d069ee7ed3899379e9b79f7d12b20d63cd863d68fa45d396195c334944f3cbad939b69dd4445a2169d58f47ef67a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eb61fceb1d35571be50b0ef00e32371
SHA17ba6fa0a8cfc2e1cd5a78281d38ae827c5f121a8
SHA256111cdd018d90c432bfb8ad9bdc789f0359aadc67ecf6e42eb015bc0c8dec6a29
SHA5120017ebc6f288645157d77e7a86f115ff22dbc48a64b9165bd31a048671970e2e99f5a1f5bebc2bfd1920bb14193d13578d0b2d3490424fd16420f43a8417fe8a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b