Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 00:32
Static task
static1
Behavioral task
behavioral1
Sample
fb2d79beacd980cc54c14e57b5a99570_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb2d79beacd980cc54c14e57b5a99570_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb2d79beacd980cc54c14e57b5a99570_JaffaCakes118.html
-
Size
5KB
-
MD5
fb2d79beacd980cc54c14e57b5a99570
-
SHA1
11d870783cce5d8d150090481dd8d18e7ef4038f
-
SHA256
347a6a0628f046a52830e4b38e36b7283713814c52dd68b9b8a8f97a16b1df77
-
SHA512
a47e1bfbb12565c191687ba3d7f01e6b196f584eac4a2c904147c45f329c2b38b6d2f0979ac4080a067a61cf230b0c7c8147b4528bf1c44837301c98765976d4
-
SSDEEP
96:1IPyCQ6oISUKzvehCZGaXbrI/zvXdG+ioAaKLah3xVFBcD:1Ie6XS47aXb4zqa1q
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000062167fb618fbeea3a393d19031ffd38861afdbb384754cd9a157850abf13c93d000000000e8000000002000020000000e8e77b3276e01d05d7132996387bb7ae31286b1398675c641c1c3feb9ca7c11d200000008c68331b028d59c56807bb6952f1f23fd9ab2bc4dbb37c064d6e32b33d51540c4000000067e938b070293fe157e078af0252324829a8876eb2e9630b2c5b1bdabce4a29e882cc587a7841e5b6cdecf2405bf5017215c5f21d5c15ce680ca4cc81c803eef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D872B91-7D31-11EF-B4B0-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433645405" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705aa7f33d11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2940 2416 iexplore.exe 31 PID 2416 wrote to memory of 2940 2416 iexplore.exe 31 PID 2416 wrote to memory of 2940 2416 iexplore.exe 31 PID 2416 wrote to memory of 2940 2416 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb2d79beacd980cc54c14e57b5a99570_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f08860879d50542fb6f1950ca78f3f3
SHA13e25e3efeb3f8594f2337b7d6f10855fea24a332
SHA2566a4948f9963e66b34895cc9a2f22008a3b89c0ce2f552f3cccdb3e25283cf261
SHA512c6505a8fad78c14d126503cb8f8f840b98f69f73bbcbd595bda2da7802a5443f441875cab1000a1ccb090c29e78c081777a9218711e47427cc07b301f3fa4be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3be34ed90da5fcc278f7f1f0c983201
SHA1db7451b23698285237c71afd6e91599cde868f20
SHA2564cda4e997875a5ea2939710ad0a71e3f201dc0bc0c8ad53c370e93cf89ec1399
SHA5121fe22e13104dda53d1d2a5e67aeb3036039cdb370bb2c7df3e9e3afdc72c6d95f2066e915095a23aecd12c64688b2c1ed656bff69c254780401948347c28d04a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6ba793b60077582b49b3d827a5dfffd
SHA18d82d98f9692319d3625041f5b3db78c7627423a
SHA2563c32647a7d33cc1bd3d94ded74435ad97619245ea2a5924e164db53016f4247c
SHA512b6a6d5a0f9c25372347c945070ecec15ad3798e4fae59031a969ca2d47a1e9031a9ed3d48f249f916bac53b7705f4ba0d4773607e26661cfb2a064650993c036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6ff9c8441c6686cf324ea4cd1686734
SHA13b4deac08bdac05296c197247d1f06b91159712c
SHA2566e616643692eaa23b707134b5451a1bb0c6da0680294772fa7889473a29b0df6
SHA512c6193dc5c7a9438b5fbfa7709bb55e6ebec27305a16d2464bcc56a2fa060234b73a06af3cd688f114bf9ee967740ff46345b7fe07607e570781f6d808ae5ea66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511ea24a1cf0c2d4bca5cf7e2452474ad
SHA1df389fb094a9927c56fa9e85b401b75b03c18a79
SHA256dd2c44a2459fde7dde6a748885c0e12b5076af5ff78f0fcc06d3d55a6bac1a94
SHA512becd5f518c0bdfaae3f5bbebb9293dfb0c031a3c6883fb361a04819ec66c63cd5521778c86a5f3a2bd37e78a4be4e4c954cb163edd803616d5fae04a217b2002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52526cf3c38e385c01611d4b05e7969e4
SHA16a032a2192de201771c6b7874562a2286704487e
SHA256856c2d839cc9d37fd107bb014ffcdc5bd763263b3dba0660ad29836b6f1e2816
SHA5124d3f3c08fb2fbe31e3786d0eeada939c684075d105c9b52572b22c3856640f65fb2ccf18514cd9f3b7f86187730572eec10a99c70d0432664868ba0faa1ed8c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7ea48f7045c259ce4fc2a55967c6e48
SHA1fce21577b7bf3035c364bb81f5c453b9f87946a8
SHA256a8522dcac2ae1d7d53e96e97e75f27341cf1b278f7e1f6386cace00f5efc48da
SHA512810e173fd270cdbe9ace6a7d3f8ad0d46e6794d7538552a0bdf347d9951cd171598005876df767bc2247b16a90b365e751f4944dffa68bed8c35ab838e6da232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5237f64be885c0d91e7ca2849fdad4b62
SHA1d78971330ec777671e40e8b341c99ade5e0da60c
SHA2562d3bfee1f513b9539aef4c591baf40618a2fc5c8c63664acb0b1591bffe6fa34
SHA51273b0d789ba12b5262fe82bf2357a5fb6625657431eb7b6f3c1a7140ca13e4951ceeb4b55d40706d0a2d4ac1a4586ee3ccbcc20f0941b34442c8307b0311ee2f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dee7ab5432b8aed24710d0cc18dcd53a
SHA1c012e43797bd51acc7cd4586ea90212fab5403a1
SHA256f3b7ab06eb3fd49955744386227dbf27266f998e1738fb7759757bbcdfbb1670
SHA512171d59b379bae1d7de6eb70c8d7de922dfe893899c2b2f837de45d40c60b5b74d2d595e4d950a30bdc3dec63d5f8a9d47d81f2b13b6b9fc408b2922c2d52e19b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1b528fb8ec5b46527eec8d3abde33f0
SHA1beb77d563854405885927b050f33d38ed91592bb
SHA256071367d8592c24578d6be16128665ee683185cdaf1836f7efb73d09b8824fb34
SHA512194ba68fd25b29a106c4158063ae412f03881ce08d1b7f260715538f513a60072ed362bbf629d7a0b170de8044a009fb7f85cb848185caf3093af09097b7dd4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd261c2563e9e4334877d1d705e760e5
SHA1f2f0aedebb67481bcddcaabbf8dc3bcf2c975376
SHA2567ab1cc8f5f8cd0ab2444771d0a6c8044c7e1cbf0f99e5fe35d9ed06ad254c90d
SHA512bb0132ff30cf8afb0246ea2de2bc8b69fa828a9c5f21ac36013d6e39fd62cbcec361583995206a3b1fd1bc892f32170c9d6ae920392472dd31e905c33d1be127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e103605079d0d425545f20e2a34d68
SHA1e250550a4d1b743a39c90244432849f728759604
SHA256229149dd459ace0e2bcf04e7a0f00750e4332112191f3222292e5aad4c884ecf
SHA51232f156f402cbd52789b091c397bf233b7f832ac8f6b0d686b64ec973ca69fe7a01e2891c0668d8b2d28aa6690c081d387305eb58b9f54700b76c51ac409d8936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2cb6a30b0303848e0ba0bc54aef283f
SHA1aa7d25bde2a9ef89efc8ed7bdaf7b0bd3dc11eb6
SHA25693c408d8162e3d508480d665eb5458b4bb1944b12f7879f77a65cd7bfc18edea
SHA5128712f8686b38b0eb300539edbe762bd41f16c78022db7c4a3dc073dcad2f37e1e4e72f48ecc9d0e333eac01da43a5f327dea69aca516806f2d33a8d7a41c8a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e13b483c5acfd4b056f0eac0c1c0bc3
SHA11af8b319e755c24731bf716946624c2a847aa748
SHA2568f97c6039b8fad0edcc22544c8cfee42845e09bd2b0455a9c7b6cf7f3af5a5cb
SHA512c21a4cfc85d6fad0a7a66c73844eaaefef55fc9955e6c66195ab78d441eaf4e0af842724b61faa73f0ddff6bd131d05566c9c8387b670bd840de0901f4cbdcf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583b3c9b3e213446637062f42ecfb57b7
SHA1a38425477115afe81b1899a759a2e39d831aef60
SHA256ea68a56af0571ce2e8a019587019634fbb124429fcef7edea09afc19d2ad2909
SHA512031e86ef6000238e3497f8338f8f21962e7f651ecfa1eedea259134eff40d0749ececa3fc00cc3e0b445238acdcb3cca7a9bb33a504796f8ed2d94e7f0dd50fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5147b4af9d3497c6d673568eccf4651ce
SHA16707ff0f716ddabdbc38dc10e536f0e1fb8b38f0
SHA256855e24136d48df4cfc3b1b076c8c7ec15e88b9e9bab23d793643eb193228a28b
SHA51218ad9d336c979c2ca9e238109854822ad6e6972e24f7970a464c126b9acbfbe07813ec59426f36a5226ec95880c212de7e06b8661940c7c201f0d048e4da197d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fbe476ec9b340a680dbeebe2784d6bf
SHA15696d7ffa202ac079306692addfb379357c338cc
SHA2563251c3e6218c4592ed4ae9e4348dfd1c8d5ade0ded1f440f48694839a7a2ea01
SHA5127acd2d6db2987452ea2c612bc3258a10c6838d046c788d93d6e4a7e39ebb2455ec420a5362ac9a35900ea2e6089a16261848f194b7fb1189fc661a1bf20203b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb21ac0df50628151938f89ffc01cfab
SHA1b5f85f6a3e0e8901ed5c5e4798082b2f6837cf1e
SHA256314de53d816dee91e88a37e7e1d4ccbfd709cda3107dab63a0194046d1988fb6
SHA512f49950510ad85f81ddd4e5557200ea0a296df64697bc40bb101996d66ee3e20b58b3e64f6f5ef06afba09dee87d5e26bcfa5bb8653b3f935c3d7238691fe0c11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59df064edfa52537e6dbe4fa7d393fded
SHA1712e092c3f99605e8aa3a68d307367079b5aa7a8
SHA25649bbaeac5c3ab9e4d67238a6fb35822d9aa70f57c92dbae2c0314809b478e396
SHA512f8a2c96d3cb8399f6f581a57e277bce1323c9c1df42919b5571f47af7be5b7c88d8431776979d40efde8755897d279610de38ae7e25489cd6af46fe31ad2af23
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b