Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 02:58
Behavioral task
behavioral1
Sample
cab58cc08dbbfef550b2377f053505a5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cab58cc08dbbfef550b2377f053505a5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
cab58cc08dbbfef550b2377f053505a5_JaffaCakes118.html
-
Size
4KB
-
MD5
cab58cc08dbbfef550b2377f053505a5
-
SHA1
7a1fa9463b973b423677789d64ca686aff185108
-
SHA256
17c1882b9201a4145a4fa8db895ad8e69a415886e2c8866391ae3e6beeabbe50
-
SHA512
29bb93c3f1076752ce15a928cfb7d178d1d92121b3900ec0b6dc6ea652f88f8901d28358feda53c15b88a73e2e38b8bfaf9b20264017c2a076722e951e7d0dce
-
SSDEEP
96:8y+cAl5azln+DtZogvSvxHdJRSBdK4wsZ+/iKFe8L2IjctE:8OAl0z8Dj6vhdJR7X8KYQF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b749739b1ffcbd438c28e074c34a2cfd0000000002000000000010660000000100002000000035ad4410db05004ed4eb2bb227f2c0e59b63639bfa66861634df1a30027c3bcf000000000e8000000002000020000000abae374356e8d882eea8c457932c18d199ab5ca634ec6218e588ec918fc5263220000000a10d472378850ea160925a0d11523e602fea97025f4d489b143b70a26644addd400000003a1987042fa12de59d74fc0a797fe591a97526145c33a1187ef3ae8e7b9894cfaeb4a4afe1e0511695340d9f1cd1302a009da1b22abf50616a89069b89c92ead iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439615756" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b749739b1ffcbd438c28e074c34a2cfd000000000200000000001066000000010000200000004953d253931b797b6eca7d41b142c30fef29c779254a9da83084a987cee085d1000000000e8000000002000020000000c13b896cfa6d15eec61bf3e85bd81797081b56dbdbcfca6794aff8783b51524690000000ebf83e3aea9557e7ed511c82d01c80e3a7a415c112e246a0de59d8561bce6ad8a3dc1840bc1107bbd6c1e1b1ee6d7fdc139b1a4888c6dede90adb7df725337ad518e23ac13b067f8aa1f84d6137464dcf50befb07c25ac3572ca27ef0e498bbf30c3707877a6943633ff95877ab938c3c93459e264130796c323c2c3b31fe55d3f910cc8a2f8aaa5794fc983b38c02cf40000000e2c11d04564ea024e5ce43d80433d2e3c3ccd91d0ad5cc78a0760ad56d5f7860ff325454844baaca942ceb3fb9dfb6a33f898ce6679ef6b020c5a2216f0417bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10650bc18a47db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC99FF71-B37D-11EF-948A-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1968 iexplore.exe 1968 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2056 1968 iexplore.exe 30 PID 1968 wrote to memory of 2056 1968 iexplore.exe 30 PID 1968 wrote to memory of 2056 1968 iexplore.exe 30 PID 1968 wrote to memory of 2056 1968 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cab58cc08dbbfef550b2377f053505a5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50db920c7f7d71c0c226f5de3ce9f27a6
SHA1ad5f7ba034091bf640d010b3c94aece7f464fb5a
SHA256ccb7e2a0b6d49f7ab6f1448dc1cd1b2c96a2df1ca365fcafa4f3c6e75ebc08dc
SHA5123e4ee478efa88a9defc65c9e8d43115a1c68931a68f647b3a5f9f2815aeb2c2133d2174bc9fb698af4a418bcf4567aaa7f03eb8ba437c877b88f3cae7864062d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cb765d95ad23deef15845d3978c1a49
SHA18d0a548f24a20fd52030e0914e5d24db1eeada0a
SHA2568db14d7982a96f3b9008c0b59e2622cfd1ca3c69bd38bb31b4e06030d378729f
SHA5123a3ac1af21f872836aa919be14e5ce72550f67e2d77fc5b8577a78a200fd014b0cb8d2168c1d8a9682a1157b30ff49e07bac28450b6da8a8f9206f342416bee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53084626d73edb4f1569b1a65c2d271c9
SHA1a2e107cbfb3bcc889d47bf6d30a977d1d30831e6
SHA2564758cec952eb9aa1ab1b762853ebf5c4b3a43d1484fdb7387506f56036399e74
SHA51273a73fb2994079733d96b98226ae88c6cabbad7680b253a41dd56904f187c14b36d541e77c5abd991929fb16409b96321a0d859a234cc7092582007821ad1a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558397446ab4d32a7e0955e6adaf85ffc
SHA1b2bdf56b4e9b7a9eefd6dfad0f9aefd48258def4
SHA2563c0c2ca69ee85c0d6a23a6aa8759e5a9baa9c5004dafc58701cf7f32fd03ac55
SHA512c7ee3b6e951cebc2afb64822481727d6998a1cd52111db979d52036b10ef2ff1e83a221693c0b5b791bf997f2db01dd5d09af76699ee129c67bea2da7f96e8c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5089634eb29da2e63f630c1eaccabb18c
SHA16c20883f832a004dfef692ff087d5033eeb87dc3
SHA25658eb09b7685165ed84e958d1d74837017bde81952709b71a9302a0c7672e2527
SHA51251caf79315b51feb4782e30207df03e04bd462eb921e394f34eddbe07fa8685554f8832d1ff6fd484d92223ff7e32b0863f268cc06d0380366b155e586c004e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595ed7448a2ab17ec7522bb0afd06134f
SHA19abe79cb0638c95db9cde779408d55977f8d1da2
SHA2564dcccccf305ab958a5f98e14cd3c266c3ccdf8a783fc2a880a52740f22dc1a86
SHA5123ae08e878ef738ebe992a50b6f549b9f6d825b43ddf624b4994bff2f8d5b3ad718c60022864dfdb4bc5b6df5cad9613c6b00492c9c9ef3484bf344b9f59429dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530c9446e3a4a3d513ff47bfc52e42d4e
SHA1b2a3243fbbb23eb83b87092527fdef06e4ef69e5
SHA2564953dc525f517b7c880b1a33695ccce8dff984d038c045d4efedca306ee710eb
SHA5124ce17a4e4c1fcf0db15e066c242e4b6eed638da1c95b977b7ff03ca057cf34d336a8669b5ad0cf544a38969a77e764053f642c17a807509a6306b44e84ac67af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b57a5724974b240d55de675cb0498a
SHA1f0ffa1ef153b7965997f48df117a2cb765785c54
SHA256d40d8bb4c99d05764363069ecc8a3ca0406b8becf528a6ebd618b8c9cd087180
SHA512f0401397edcff3636c4283ec4851ac9882367c67632920bb69ceeafba2270f02b01c1d7a95fc5b1ab8094b923c3e76b3296444e423454be45420e7f26bfb7039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5050e3f7d0ce4e768f63342106ee1ddcf
SHA1868bb1e5eb5a64ae72cd9da898d6a58ca8653375
SHA256e201c70cb7f365c7f78a53862878e429594a0433747eb3b4ed3c8976ba3f5b84
SHA512c1fb2f3d2fbced5d12d452281e524503161f8b1bdd2f9eab44d9c8e6a4ce35d505015204ab5de52fc758ec0326a2ef896298e9f7cc716e3115d90adf5d4c4b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57362fe9d44c3bc72a473382eab1ad238
SHA1f0587da2863fe2ebb9d23e0b8ee5fda93df28650
SHA2566833f08d38d247bd402ad0a31449174eba22849c157faf0a502d4007a2772df3
SHA5121ce5526f095d9e6fae15be50835eec63f49e1f95664eb9abd480258e104226d5e913e622dd9444478541643c001d8ca1f7639d0770cde7750a0432d2be160f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543bd0943a7a27938b877b7a4e4966c32
SHA124f2ffc143fea9981037bd48202ed0612992f3ce
SHA256af6f3b7a9507241caa857bace7bcc26eb82bfce644718060fdf9c35060180457
SHA512dfe985259af208deaad8a2e3c636b1bf956b01737db3b3dd96b28534c7221aa15369bb8690e57730305ad627f4214e76642c7aff82e4062049acc0cfdd5b506c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f8e443d78dc089077544ababa02a47f
SHA1e87dbd5b887e773823e07480917b365ad4d1abbd
SHA2562bd23ecf28fa57f367d15b82984070cec04a625e427f8216f0e6aa73db10cd3f
SHA512695fc8265ead8a71a6db78d25e3f03b8505180471f4c8a479cc6619921e4adb2bc30035c4480b0cab44f4492adddbdadbce71d9f67e9fc51063c04bc80fde1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5082e4df6e0ed70bc275169b769e231de
SHA1acbb1ecd64fa3402cb6c64fa2a337dedb8e1cf9f
SHA25625b80af1d3c27fc780a682d082208cea5b6b3fd6b5d38f60bfebb9dd18907c5b
SHA512ea4ce16cef120b4fd038fbb76a455fab9271554dcb5ffff0eb3b2d6e4883ba3ec051ef80cb8395a1f540912f2d8035245c164c17291dde6dbabe96c4e8e0122a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aaf5e7b04361283020db8831b19e515
SHA1f8d21817a38b2f68c6ecdb9188e87f30e88027c4
SHA25675ec7627b7a191495d09e6c78be3569c7a35262eb783a87f9a24cb628bbe8649
SHA512dcc80f7131ecbbee57f37e7eb60214bb7799eb6a6a6cdfe9ae475f418f328e64ae9a1916f0975ac6b656744a0963295043dc6b075a8116841a907cf730ff0bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd1461763bcc9fb67780fd2ad5046db
SHA1eb856cb7755e3a42b86d4ab190a94ed7f18b4263
SHA256799a55e9c8e7415ba5133403399dd745a785da174c164025831b1a8fc44eef10
SHA512d468f5743bef82b6a44b6f4df349899dac1db34da0cbd5865682f254388a1b91f7c0581b1c689ca571f5dd4ec47951071d3b928a5742c1885aabf562b1f5a519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511870a84fe4fdd338c877fddc2221179
SHA1f6ed0797ffb81720ab44c513288e706cd314429e
SHA2564c6eb793839acc5617b34dd66fd5808e3f328e41f6100367364e504ff4987767
SHA5125323c3056847e4e47253d97b9c935e63198afbaada23b72eee591297961c78908a7ecd9e0e88df0f91154626a34f359c3ed38d5273c538d7e5a2c05f82dda0b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c49e7da71289e8afedb1deeb3d524415
SHA1dc6c76e7252f38f78efe4621494cd37db6c22f11
SHA25634fa5006b699f693be82e363367d5fce636e4ff27dac59b3b5c87ecaaca3396d
SHA51280efe083855ca3d30089c297e5c88135f1c2df108e89c19d748182629af167148655e7e2c6f1a9c96d800cf0ad6b83d81cc1b148c5a2e6f23be3c0e8475767de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c52bc08796764fdf7f380fccd8805891
SHA120cbdd445deb797537bd3ece5460b69bd65ecc86
SHA256da2bf515700a7bb17b1a2e4901936372d8a82700e6ab2723a2bbe82222b45d3c
SHA512af0bb81269a6f5e1c712190c21afcf93657d452a944d71ba6a2034039fbad49e23b2467d4373f5d9286b5e7ecd8eab4c32baeeee48c7531984b023a230e30045
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5237f32ce2b4c5d8f04051fe463dd1edf
SHA1029a4157d5d965391c3a71b0c2e738dc5f19704d
SHA256dd402742d66226d4becd23c30214dac85731f076e9ac1a4d8cfc09a061c9da20
SHA512534809858ee897deb7656309f2f24fcf42cdbab0d1002fb36c98a0f80ffa145ef6e6d939bb0873e4b06dd4ae47d3f1ca7b01e233b32c39b007f61eb8a6c2fc68
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b