Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
650f5475f6fa94c097c3777931d52e5a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
650f5475f6fa94c097c3777931d52e5a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
650f5475f6fa94c097c3777931d52e5a_JaffaCakes118.html
-
Size
122KB
-
MD5
650f5475f6fa94c097c3777931d52e5a
-
SHA1
936085daffbbab0f692ae812307c44a1895bb0e7
-
SHA256
0ae6308f383edadc2614a8dfd6f6a20720bf945df88835dc27a39d07fe09d7c5
-
SHA512
9ca06a8962d0fb647e7f9aecf257b9c68be47051c1c9ab8f81d2f0740792c1ed472aae40e5394ca6a0c6331a849bb409aac08ae6a0b4e52d663d2abad5918dec
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcQg1HAigdLUMy4BcZXO6sqp:s2DML7BO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000f064e6d23d7a83dd431d43bc7e3b74c6057d2b95a4e865e5445c0749120d6e2c000000000e800000000200002000000055ee62787256e42f9f0aafcc87650a902b174974d99f343e0f35c80c9c0e16522000000009d61037d95e16a3d54e04cfa977c76be24bdb6408839c12bb0a85fe9d2a632340000000d13ff834ebd1160230a4ed0e5ee8e3109b65f54d69e4c690818c0f2cd9f0487a5ebbc507b7562ecde11064d36e114013b0aad77d1da757b8dd14362427deaf76 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427852172" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0EC80F1-4880-11EF-81BB-526249468C57} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20720f9f8ddcda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2380 2388 iexplore.exe 29 PID 2388 wrote to memory of 2380 2388 iexplore.exe 29 PID 2388 wrote to memory of 2380 2388 iexplore.exe 29 PID 2388 wrote to memory of 2380 2388 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\650f5475f6fa94c097c3777931d52e5a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fedb00aa2002ec5a19b736d730a82f82
SHA1e97d38a1dc07f10cdf4ee37d2efe287fe47ad3a6
SHA256f217dc5158ec695eb1c3ee3088a2887b29da10e0c04d7e1bbc0e27bfd1cf1d3a
SHA512f64349258ef944bae1ec4ff7e482d569a2d3c861d25da1093b883118777b601f7b1af71ca569736971b8b866c8d2020d76880f79529448f5face094c380a13bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4bed72c4d3788942d4cea9272294e82
SHA1d777100e9efb510dc625e45f8a58e373ead4c7c7
SHA256cdaca975ad1a352d15eef4dd233f502e005b85e50a50ed89c1d46b51cac7d4d8
SHA5126435b772ed9bdc00824e2db1d069d616b452d34e07b23c6fadc0192b7587b1b45ff4e41fe3eebcd0e54ca78a21a3053467bc194355e47d117fc123d63834769e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c144941dc34193d53225337c3d5345e
SHA1d00aaa3f17fe88274c5ee8ef4b3287cb48cba680
SHA25616b603c2de014f66f3a70274e1ef2b7df1c99b04100139679be458672ca6790b
SHA512789dd42455eda4178b31cf54bf9443f1b9c927715874f5b17c65ab8247735458283293a8c7d41e949b87c4978667b1e57c2a8ea47d7dac12c873906f2c4807b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ede2de7507a796abfcef9f56613ce99a
SHA1552d5b06651a354db19e9a0002951f117fcf2539
SHA256d1392627e6e896792b2e905937bd26bea10eaf6f198aff68fc723e8ab4375a4c
SHA512e4df141b9e3c6850ecc61ebae67fcfe323bae27fa852667847c1fab00e1fe3133eac15c4cfc0e8e1c3270f35b787c41a8c3ca23694a64dd2929e55069c6f8911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5645d878c8b42f34eb64d8d8a1da5a2c5
SHA18f5e43de4c2df51b7cf72cff130fbfdec6d7727b
SHA2564fff64709bc2be94d78247009c0b72cf9393b284e8f08bc02fdd7b074fdcf51f
SHA512726ec0f5a584626774e9816b3fd58a8f9a012ded4bb105df0d8c528013e2529879582899ea8c27fd146d70e1b13b6ae22f38ed5def8254bf58b1b5f66bbd1fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae3633c2b576b7299d31c3417e35e0aa
SHA1587d326336fe79058111ad9bd8fddaf310bb866f
SHA25681efe403e511e76ec04c6edfc24709c75ae26ca77a6d73bed2264830c7557366
SHA512962d0bc4361844155948672d921c730424ed25c679747b1c982dd0629f163c38834dfeaccd7d41fd4b43b6c7e81a8938194303af7a8b098ce40dcb5fe2292215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f063e232652da62852ae794d61ef4fae
SHA18b44896c4c6225180a3ff9cf59a2addb5355127f
SHA256e9a3938dfa1422d930705cc20ff9c3cb185f4f46aa97c1b2fb62866561e34eb7
SHA512b1f3a96d671f4ade329631d04fdfe83ec4bfe945d29bdd226a3312ec411fb52a255a995af218200f2bf58d8ac0ebd60c883f2efbfb00d46baf883d95dcf5f051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bdc79ada50aaeb36ee4a4dffad79dd4
SHA1f267da4e3b603fda69c005b57a80ddef01d30a0e
SHA256db17992d94538fd53ceb21063f51c9c12a675b08e5e89718d111fb6acc3409be
SHA512b3bb8baa0bc3424f59317429ae35aa84172f3b42113480f5c103660060fac3ebf9ffafedb690199421e9f364b6094233593d812f10fcfa95210aafb9ac961bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b944bae133066c22a1de64bdb43a9878
SHA128f71f3517b4299b062f79655699cce6dd6df34d
SHA256859e36cc8e6ab8c2d455d92b06c804986607f9046b0e41213cddb81b846bed1b
SHA5121013e58dc65cd045911fc2c7e6435f3dcb018483b37349d56238f4f20ce14885e41b32b471ec2e5192218f9c2bb4c43bfffef9a376494d020b510793b658962a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598454ebd2b4b888d239f36cef8037d2d
SHA16b028b4876f949b90cdc92b5f02e6116b793122b
SHA2561c5a51602443c41cb28f5b115b3ff22af7ff02edd829c6c573bbdfe7d1882348
SHA51276ba32b71eb7fb28963b8c4a80dbc65c2f9b1efb79e18f7115e22e6a4e22203efae5f1d380bbbcae03b7741ecad7f89c53d71caaf26f161365ee9daf192005c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582bf35056b24d895bd5d9245f845f8bd
SHA181907123952904a0afb5690909e9cdcb01d353d0
SHA2564e4216dc57c1ce917a91de29dfd4c77e05915c93001326fce514c5acf0b6c423
SHA512c6997f05b1c52d3862ce7edff4fe68d54841cc9e52f254f512351fc854b5c72efea6e871d1e4c789fc740956ac59930e099c7697b0445a8d97059c6d7f9f54fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ee4fe07f8dcba76e4193648c68eb6e
SHA15dd1b913230093c5651e6fc9f2d83da074c6082e
SHA25670762cd73f42efb910904ad28aa34616536d86df06b5434bf536d958bda92b96
SHA512968458b324e5ba78e451672d4d69ffa5effd7e771eecf030afa6e3d7ecd43265da1c54f72a0a5415d117517d69375500f4dc1b10c4dbabde2cf053766cd25dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d52315f8f260b62408063647f25dbf
SHA1fea478796943662062b62b3aecf2194851539a66
SHA25624810fb2cdb7566882b6f5b7d7929922cdd791a86077f29338567f47365bbbdc
SHA51274f121aa73b59b9450e55f842e8f5a9d413525c62fc8b4c6d9b58b67c454610f3e4e8d2a7357255464c5c0543e910a82251cc3a3e331fb16b4e1baeea270ec44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9a11e6deed4c0fc2bf0275b78e3ce69
SHA1a12372743a9d50e3b58daecf48b6095732ef6989
SHA25607f67cff01a9b9e025dababb373db191aa3b608467202e64dde88a4eb59f055d
SHA51252134d3cbc9af5f34a7f7b4a3f66abeee53a8470d1012764dc927837127953ef0a14304810241f4c31d3460e2c0cb4c546af6c950e7307669147c54e318dff07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b06c3c5697de1cae5023d9cb2298733
SHA1f10d9ea4323ef6dc1934337315ee866cf61000c8
SHA2563101351c7c9039bd8faf7cb0e604d370ec5ee3f006e03078534e0fbfd9101f02
SHA5127fcee8b5c719f61994e21555d3b4229f157c9a8963c078b9e2d5be26873aa26420f342614e9d809adb22f260022a3ee7c4e86a15b66b36c55d5401de99a69c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536dc4bf5acf5db71541b746163eef15b
SHA1977f32b208636ab584f1fc52dc97b6f9244cc23e
SHA2562336d4081ae5048a3e29bbf92f7fffaebfcc2df3589bf68e13767401556fbbd7
SHA512d55cf6978969a4bfd949895c5d1abacd46c1aa0ed54fd5762b17a77d0632225bd485246e06c540397adeeed141e2b0a0a237a28c0376fa777b4bb0e25d8bd6a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeadc83ad46ab77d8b61f327eed0fff4
SHA16562108a9eaf3b4e11a8f2a1f62565e523765ec8
SHA256e0be365848c21938d16d04fc9ff1805d0599b4833bc34e3554464b9ba4899277
SHA512f1a7723ee5b29b94f58b33f2bb91d99ccd61ae378d80c01e57ea1e1c0ddb6dd4adfdf88b7cc42a4951efc3c0f1227f9a441dea5ec3f448b117af60ab5a32835f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57acbc7dc75ae834700623fbce5f08c12
SHA189ac7af100444b47726cc7163ade88ce4a4a534e
SHA256557d137b06b0dece0f8d511860541f28544eb9dacfa4a4389fc3fc8bdb60a0a8
SHA5123ad3e159ecfe6cbc520b58d41eb6a6891f69303cf2072d028cf61221edcedd46e04f965db551d73c19c77be768ecf1e91799d043bddcaf1eb0bc2df4904ab46a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59562cbc50b6383b36a19fcffe7d3bcb5
SHA10c9cb44011cb2a81aa4e1379d26920532f5c4a14
SHA25672ac4fdd6f2f4e2f6da7edde84e91714dd5ba5ff38862b15e522ec70be145185
SHA512aa74b2f3028e86f79fa94cd82a3dfa0cc530e4790bc047a853a1ceea58172aebe1e6ddf5004981877daba759d131a52bccf18872b5c3acf915a3b07b4bdd7515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd018183a859c59eb7575c6c68281c0d
SHA1f50f31f7cd6d3795a529f0f9009677cefd0f7bf5
SHA2564faf20956a996eba18d7cf72cad122893d69bbb439b7f819676503368b5f4412
SHA5120337dcc5b12f5e0707dc71c080d521cc6499d2928594aeb920caf535a660f7b58e301a40a3d83b00bbe872c54834f9cb5e05ed4a197182d067de3a2e8f234247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0143aaac935302a259a0634a8727736
SHA1c7fcbaad2d91b62d0409a7e9c400e4e39e99579d
SHA2565a59ef7b4fa3ae9eca9d11b93a81be5d8821257e91d768f27c6c798f8691dce6
SHA512a03560f26b64c3a4c7bb447a6c45120fca5f4c76656c2aef1c9a335e72cfd8b8e7a5c6030f4be434c480011cafc1b452fbdb80191bbdfb34490af22db3987a77
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b