Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 17:24
Static task
static1
Behavioral task
behavioral1
Sample
8ed93275d2a8491397e9fbcfd05c3fbb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8ed93275d2a8491397e9fbcfd05c3fbb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8ed93275d2a8491397e9fbcfd05c3fbb_JaffaCakes118.html
-
Size
31KB
-
MD5
8ed93275d2a8491397e9fbcfd05c3fbb
-
SHA1
8434e25feddea0b645cf71de92833f3979960912
-
SHA256
5a00758b86e71fa71e77fb07e47d079dcd26b270d0bf14bb08d239bc182b2cd9
-
SHA512
cf05d769446c4d4769be958c7e8814203e30eceb4606aedb9f17d42aa89f4f3519fedf16b5d65177dc9fa6980de6ad4812094fe1abee28744c3ff749d979d6b3
-
SSDEEP
384:qd6hKeqvzwycic3NIGVuoqrbNZQ6EDPBJ5/Xxxy2TuE6QAhr5z4pBM:9k7vkycic3uGVu5Hw6ElJluyMJ7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005c0db63d5847504aa1e8518a94a3ebd00000000002000000000010660000000100002000000020a901c4bf73ea1595119b12cbb3ea8a8ee99914b43781891577cd91e26c1068000000000e80000000020000200000003ecdbd8dae99575600aa870681a6e75cc75df5c9192fd70219be5fb84935447a200000000a4c3cc73c6aef48309f4404886a7494690e93f05bba6822fa7b15aaf97322d3400000005a8da057d4dcf3267844749b3d6ad414dd9201dcd556aa31aff33c754aa7705051b2ae5f9519961db34a0e2e83a774a5bab2ca5c8cd6a73451ebf271491e3160 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FACE3311-2104-11EF-82E1-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80284dd011b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423510942" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1612 2168 iexplore.exe 28 PID 2168 wrote to memory of 1612 2168 iexplore.exe 28 PID 2168 wrote to memory of 1612 2168 iexplore.exe 28 PID 2168 wrote to memory of 1612 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8ed93275d2a8491397e9fbcfd05c3fbb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e88380b6c95ef33ba4ca44b44a17c89
SHA1bfe96c50c3bf06816cf1721f1df7d36a25e4669b
SHA2569c623f0f8222109e08213b0ce178a1b35381c7f1fb925b60889f4738044f26df
SHA51220bd5271f60cfa530145b94b2144afcbe5b5232f998fe3e6c74b9f926fc37e36990300b1cdb6940db2449be6047e55cd2c475157bc1ea42f3a810448a07e23d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570bcdb25048cc3feb73525b204d23ae5
SHA1a095276b73e434a20b8c2a5e5f4a8fe50525694a
SHA2565c4a9bcd290fbe7dbdbb8df41e86a23a1dced4247fa41ffe849a5c2861cfd8b5
SHA5126908555f09212c2afdf8565d499332a322900f5ada40128b87cd7fabdcdc17569a4fbfe6caf7c66a869981dd2700c063d1ca89c3b6627049f422abaa9bc9fb87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530815564ecdc2b8692980f3d39646a9d
SHA137db8980f6098b9c06029012d33903483d4463e3
SHA25647ad0cc3d463d817b1d6c1e5337f6f0ab632696bad042763cec92c725c1d83bb
SHA5128bfa1a0091b899fd1b7a11107191b0283d43552dd78c532fd349c357f1a8d76457627a974d902eba628caa19ec17e7a4eef6629c3e2d4a174ac335bcdb2898e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec36a7d22d7de23e732b410cc3c2906d
SHA11fe3da8b4560f58d54baad53a49d6fcb33fd4acd
SHA2564cfd8deff7a9d18b1b844e9218134b2f6394037d46f3f9f1782475e4dedda041
SHA512869ab555548337c824b0162e5df8a5b37c9a771c7726d8ecb009a0a300369be70479fc7729fce9f8c9adfe7a0862087887157223859e331f7d6b287f9283be38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1700c6e5d03a16dc1bad560e39c5f97
SHA14402269ca91d1613db5db1720aa97b51b13012f8
SHA256a6f8e26bb2c414849fe120fce1e1702c97ad2919be5a45c5fae7937e1ad55d66
SHA512539f5e098412110fadd1bf40c48b01f95ae838a8ba6fbab2d37a394f8394e0db94a7e6f8e4070b77a73382ff25fc3eb9be90a227820af8e03e91adda506dbf51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ddc14e73fae924b046e2d2f479b77d
SHA104ff831beafdb31d31f64da6d53ec872cd8113bb
SHA25683330be549bd551df8824863e1815cf0d23c1ccfc5dbb4e0f66c055edc4eea76
SHA5128b5ad6d8b5fef60d811fa4b0c75caafcb7d3aa401e96bb7a9a258aff72080bf1f0a1f32a06fd3b09320808ae61c4b780aabafd92366ebeea307676dd77538107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d2ef0a00ed2a319ad5e63cbf4233dd6
SHA19e2cb4cf5e2fe071d6fcd4ca1a080fea77ef437e
SHA2562fbb6a1a1c596e28c40409126b9178a6c48a0b9bf518a9d987a5c83d42b76557
SHA512265fc2ad6250b9f3d6cc228a9a09ba08ae76bf5ef6be8c4861b580cc0399a98eba374e8b451c47a26bec3bb6b9be23f26ffff1d40553ff9e64b84c5507a03ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cd42bf71cb665fd899c6d13cd8b32f8
SHA1937798c376740ea9c2a42d6fc46b7b927e50f8a3
SHA2562429eb2f487698a9a8e46476f02614b22d66966149720c584546500ec087e834
SHA51214397d480db38c6cf00723a58551462b17dbbe4c2597fcb84be8caf829ab85aa215d78abcbc4b931d3ee3995c5b86763484d995bc43d40bdd4a5593237c95098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593bf434e32a3f55012796da4f7147361
SHA19853c98d7b2339cc0a4920f2b9f66425de831611
SHA256ade6113b8cb5a22809a18d5b10747c1efd0fdb4692c18a245de3eba11ced468e
SHA512e22f451820444549d1533f58234b0fe782c6720ae7b68c1c8ee8c53e6bc679c69897c781905fff725203f35469fffa868f062b913a27b136afa5964adc6f9427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e78178af598955cf30b4d092e14e2c94
SHA13025a63c67690e5e9c72888a1b0db0148bef45c5
SHA256619f820b2b725a3857583f81ca12b2de4c8ad7a95674d43c3050566b942f592f
SHA512c9e6cbf2fc2790b07cbe802da8742b4a385f44b8de133628818bd6670ab127fa0b9146998ab0d3f7b9b4b47753cadaee66f17344b67f8318539fe7d43b481eb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558a3a1ef34e7377757c873f6613535d0
SHA1e39ddb63e2992860a5fb6d4a45aa3185b8e32d69
SHA25625a562db1d23a25c9e15589cc68988cf1f6448cbccfda5d3806f8d8182f30d43
SHA512fa3044ee7bceb47d3e06849fa08f8f44d9ee3babf1dfdca6d37d7bf06f7d879c38a3270abbb099b1fccdb6f1e94a5ceb3fceac97d7e024681bcf45306aef2754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513a6db2b27ca34b0dc8e58e5d1ea3346
SHA12662ab3a79681afee3f6714abfb0d5177a730f31
SHA256f8ffc90a89507cefc030641911ed7d849ac8ce896e09fe40e01fc9bee3402633
SHA51241da38ed219d0cfa11ce3e79faf33a33b0c6d9cb93b2b46a7feb5abe6d241e77fdd1a3129894b55e116d06fc4b9d3e8d4e7f0af87bd46ea6e3195c10cdf3b833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad93310c03f2f38cd1a39a1d4173e39
SHA13bad42ae4d57a9192b4e5b6d0b6759f3a452af6f
SHA256bbfacc8d074b7ba9da39fdd40f94588da47c99360f3f44d628665abf73feed50
SHA5120eadc3c686be49e52e41fdc04ab276e738b785423d48d4bdcfc63fbbc1d2a1756b00454fe2f472c4dd447340610d89faf8c59611942657c86342049fc06b284c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a56447f18ba014670c79854a3bed6c2
SHA1a163cc0e508985d90ad5d0ad0a830743dc818937
SHA256d4819c27adbe3a44abcdc2a611102393eccbdd2bab0fa10bf4d02cccf6c11a7d
SHA512a6723255388b78ee2056d2f692591bfe4f8cd8d586446e8f513438d3149c1b4c41a285c8eeec44f3e41a252075baca711abd06c6c88e3dd00e314d4847528d16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c17bf76d210b00dc5a01b0a55004c421
SHA12da489ed37841de941dc4223dadfb20e3f91e451
SHA256d5accb3dab7325ee1ca2f4d8d78b12f265e516ca6f42d434c13c6d8461c6c366
SHA5127a542714c43b48dc422a87b048a3d6e3bda4a2997186d0434e218f7747dd260b4d451bdd7540297c461288652a5665911ffa2cf2e46f6f32e08a4d3f39e8fd5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58285072ce65a908394840ffdb011be8c
SHA15ba9266e60ea6ac5ffdfee3a9d1a4e049267b4f3
SHA2562c3ada83f7cd33c0aac377cede6859cabc9010ebb318e8d0b9e3abaa90595460
SHA512ef0e83566c31b894fbb2cb18ac33de4f9d79c3202b2f59c2ff717b397d1e2ca3b5f0805b80e5b8e0cead10d9d8c143867ec67027ad3afa443a7f845607884606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5019c0ad0285ba5b29db17589a7005d0f
SHA1e47bcccce9b794002ec57105dc90139fe4995f98
SHA2563bcd4078be36352befc67311411027dca495e3a39e15ab86e8b8d7eaabde2dc4
SHA512939115e4009fb65d71919cdbb5974fd90fd0d1945c35954a14204ba389cbed2a732b963dc8663ddef5e8d5096e852ef36e0333dcf149014177a671dfb072e3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f874b79526dff1883275772abd63e0e7
SHA11145353303a5f382590d0070264cb630bb2dbd58
SHA2561e1d154c1824047759cbbc4afdbb89a3dea58e2f3f2c880f02590633fedcc82d
SHA512be0248f25d31966559fb51f926651e9be7a11b7110bd1be33aaf0b767a2892c149dee7560bba2c506bafd811dce11960905e23c4f662487cb4b19e8ebd1d9e53
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\jquery.slimbox[2].htm
Filesize123B
MD5f8ad67459c4543bd77af86b58864fcd1
SHA17468176dd0b1c7f88e21377780eca9e689a9f5a2
SHA256008775aa48f94d3c5f9b715a1f98ca39f9b0b2100e3f61629417e7984a304479
SHA5124394da819ddd1fe2fe17d92ba2f466154c68c8fcb837a2306c9ea79d93d851b9db621af0ab2d50cb29080836158dfa1d7dd4a78d9b5c7c225d2c94837b66040c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UA1HZF3D\style[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b