Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-08-2024 12:33
Static task
static1
Behavioral task
behavioral1
Sample
c6dbb2d23ad8026cedeeaece3b1f8770_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c6dbb2d23ad8026cedeeaece3b1f8770_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c6dbb2d23ad8026cedeeaece3b1f8770_JaffaCakes118.html
-
Size
901KB
-
MD5
c6dbb2d23ad8026cedeeaece3b1f8770
-
SHA1
d355551c8b1bfce1995072e9acd73a1a5f7f1924
-
SHA256
8bc2b313d0bc9073be7690aaae6f506d66947980d4c80836cf6b5bd02c8be5e8
-
SHA512
dc6a721fcc0d8a3fc96b076006605867a95ffc801cb43e6f3467b59035565e6b52ce64ac73b0148d8b0765636ee01d9c60830b495c8cba5a1ad4a3dbb155ed51
-
SSDEEP
3072:GClktNWDFoS3ZGJQZRwyTfcs8rBh50/00W0Qasb2+GsHd50HNZZJ0JXn60h0E0rJ:9ktFQG6ZsxueZ0N6yPx
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431010296" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C6171F01-6539-11EF-A839-E6BAD4272658} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3060 iexplore.exe 3060 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3060 wrote to memory of 2440 3060 iexplore.exe IEXPLORE.EXE PID 3060 wrote to memory of 2440 3060 iexplore.exe IEXPLORE.EXE PID 3060 wrote to memory of 2440 3060 iexplore.exe IEXPLORE.EXE PID 3060 wrote to memory of 2440 3060 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c6dbb2d23ad8026cedeeaece3b1f8770_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD519505bb31c79cc1a7db2996333def5bd
SHA160430231312b7beb8dba1f58370a7af8d559fcfb
SHA256583a644129508f37946dc725c9d5c11756b1b34787987bd3746477a0b5bcf4c2
SHA512f7e2659a83eee5d4d4e843d83b86afd9f0d96c1e75f8014c129fc80d8459f5f19793e0029ff0fa86fb41fee090c522243c9639b2a8548331cfcd5c9c49bac5be
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_147AB4536A182B9FCE88E194D59F3B22
Filesize471B
MD59f265e06a118520f1445b1f3c87c2283
SHA1b20f16c38bdf90f23e46b7f4a5c942fe48133e6c
SHA256b2114c1ed72f0e2c406fd28dcb88ea23e13f37adcf58c5e550486b26bcdf494f
SHA512322a5f5e6c46b362b7bb378b0be13e410c8dcad6f5c9179431e0bb014149567d10799adb569813bf9cc9cbc92ca66eefad6ba5221c1811c4dcd75da6a597e601
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5678ee727c9c7e3cbf82991bb0dc242f2
SHA11b49b33697b6c7795288bf86f2be0253a300ceff
SHA25609e2cafde89d24057fe2297ba019f4c68acb1beab55b6c3c9da897f8f77ad51f
SHA512f04c90b2a70a4d208bc5a59fc86c853b59e9ccc95b27ff0b321ffb896b455ba17c8189a4605a7040716f4eb5518e80120929dacc6f702d636c371a27439ea127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5bf5e0a4dc4cebb2b65be1c53bc6384d1
SHA1a09e3c97f9e7b76a912b1b837ac04ca8e9b047f3
SHA256a0705e3a314a1878e987a8e1f9d35837577671b2e6967fca9fa82f865325b955
SHA5126eb6627d2406b0e03f74cf56fb0aefcc826b915c2ddc67de5620eadfe7d5c3a90ad7fa71c2947c97fb46e4c52b9a0d0d35e5b316acbb4f702fcf1d02cc9bc0c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5519b04a93360ed8627ca39533aa14004
SHA118f0c5b08502979bb03fadb480ec5a7e16259866
SHA2563cb07a3b9bc18c704b88a8caa11149670739db71adf64b839c85fa6d84176bd6
SHA512aabc4bfce8b856e96741cf024751b2e514c1de43202f9394ecdd0a2a853d2bd4e49f4ce903ebb40c61069f5f829b50eb1c123b759ebf232d5a33add56f81c770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5543a35893a20bca3ab859e6019359079
SHA193786d950d053189a8ca5520f3f09ed7627c1b96
SHA256fd0327d7a6a516e83ff00de678ccadd7dccee28dcac9e2b044b19692aa7470f4
SHA512942ecb3eace9ad6ae8d94dedc2cb8fab2db61bdb0c3ba482df1613b2ffb4e50f3b7bb272be23113adc8a928d911c63d2d54cbcdb4b110e295ba0764051fd3553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5663ee07c8807871ba2db8d0d18d624e2
SHA11a80120a888b4d4e2a9ff793345e568dad0ccb17
SHA256a02f82e2b2020c8b7e114d4e36c73dd5257a6e087d7ab0d982aa82ad14f0fe1a
SHA51203aaedffebebdba19a50115dbc63ee775593b4d4e05b6ed5cb403bf3efdd791f3e781a8d881da8de003801159c9ed9d0dc5c36589d03dde17f9c9ce37f2e10a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD524f5719180e3760486e29192c342dadc
SHA140fcb1fe49182584d15a94e8489367563b22a35d
SHA2568c1f66cb6f3c7e13480258746086e24178faa9ae242465a0f061b7816df1223a
SHA5129818aaf00d720476e32de98f45d3432a7c1e5456240edc3b94b1ae913ff9b11c1c35c5f5671364041dd1ddc727de60404f3b0f9f00dd3f9da5c76c3b5a0f9eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae11a0969e29b5bab919a67845bd6090
SHA1e76efb94a02933d9d62422eee55a865efca14a37
SHA256b37dfb6a5872442e6b7cfe965a1df666dbb3d2b88525b443d3afc02fd2466676
SHA5125da97cb531448f0ac9ef723eab6c2d878064de96866c4f01ed2a3659ab77e837a4262fffdf8f275494461c2a188aa47ec789f49b3da9c124aefe00ed8031ca08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6885d5135b273a9da24d2c52661b29d
SHA12f5244f964ccfa34cd4c8c7268eff8bd5fe38939
SHA2566afd50670e6e213130ec75821f7672f5ec4af372eaf06ffd2647611692b6caa0
SHA5128c6ca4b12e04c4d96b0a6ca691db4231dac856bb476a1e2d5986a650fdd4a8f2f045ccc4fc158706869e1c70d846e8266c85e7c539248b3b378f3c8e4429d0c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bce157109433e40dd9598550f4561f8a
SHA1e832201c54ab664c5d666e5443ddb513addcf7dd
SHA2563944ba857532fc298d9a8db04940278630f64e0da9791307c5f63104c29d49a1
SHA51297fab6b57fa72fbd57ed60efc6922515c9401874704facdf7834067ecb6385a667b9dacb142721b462b465a5ae85df5ad08d50412bd54a531fabc005669f78cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b70d350a847df2aa4f72893da7c189c7
SHA19f98f0041199abe6b5c8348800c63e1a8d4b3b6c
SHA2568d8360fa353ac0033c8da7dd1c180b578a6c92c8bef558e34fc36274a40100ed
SHA51299ec68e45c15ef357c2a99911c2800b51d3bf99ba174836cf754d36ff5a0b58d5516ad604648a10a47a6d9b56120502b60b3d2a95e69aa5fadf0d8bf946d0eb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b1e252f4477833ad99bcff28d59dcfe
SHA106090c7b8452be389e85d7492dbe9485b051bbda
SHA2561dfb1b9894c7bf1aa35ef0c8abb72b517a14ceec93ccae9c6fcb667de5318520
SHA512f32877fce2aa9ccd6d3afe36b20c499d65878490b75941eeeb18fbfe0d76aa697a531851929bb553a8a74cff78c6fe6f0e1ac1b2ed6b22e356c32e2017efde10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a19eb1580e79d0d671ec398ba5221a36
SHA1e8943222bdb323fdf6ca38ab4a99b967e2c4597c
SHA256377769e22cfa70c159766c20c703efaad83f0b32b615f98c8f03ccdfeda98430
SHA51239b20e4372a3b56e641079c639031a4587a29cd736f283db4aaf1646160ff8edad11c65de05457403807e9aa8e9e0461fdf36b8153cf80d214c13ed9c327563a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c482fa378d48a62788459c1c12743b2
SHA1aeb12eb66e2322c81fe6f24206582b3768cf8edd
SHA256ffb4d49cc6e579e80289258569e65683465362db95d5cf08b3ed3b9942219a2f
SHA51241dd5215e0e2ea1f1f87e6d2196707375ab2e79fa4ca240445cbd2d0aa16eac0088f40a724b636bd9d8a7676a4102b57ed079cfc2af8abcf579cd824f70ddb7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8322edbdbde20df87f5567f7cdb8c7d
SHA1fe12ecba445abc252876e699f1432cf7d6c0d8aa
SHA2566e8f6cf270eb28462e042ad9618f32a54fcfe3a46c7a9ff09ed9f2a249e82296
SHA51295d0db5849d93294fa805ad0b34e40fa0ca873bc38769ccac873000259309424a7d0d10cd3e85b4d765c5cb454cb9a2021b108b78fdd9b7a9d2558a35910b6ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a8b21e75a416a894a682be697395251
SHA1497bc76d42d7c1c881a54a8002cf353d31ffd04a
SHA256d15f47013e3cb7fed2d11b62ed06c5f78b3f3c89a00c9714ec839364381f283a
SHA51205f73861fea3565559a983f01da5e079dea1675a8b30b9f56b854f7049eeb9f4f37364badd569acd7ba32d0564a456f66cf9257a4daacd8b1ddf91ff200facf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554f498a5631ddebebc9a47bf06482fc8
SHA1e06849f5f4189fe10b4df305b58e9953b4cddb76
SHA25615f22fe37cb241de004bf7a4fbd0c4f62f04c23e4fdc2b0d2cae38b41cc1fd57
SHA512b258a529aeb2a7cbce0286816380f45c1a74f208c5bf132907b1744ecf7042540ec6222a7fbc640bed37fcecbc17f53555ae6f929a7840164240415910cb429b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_147AB4536A182B9FCE88E194D59F3B22
Filesize402B
MD5a7ecbc2350f865ba628321fe4db99afa
SHA18ecc3390d51a29965bc8c0aec9e72cea5d56a09e
SHA2561b7329926351cc80b79ce93d7c97015dc69a434a8cebcf47b83fcebaff83895f
SHA5127dd3969a18063d0cbed330ca1fa28277d6ed639964cb4b50f755f5c7cad87ffbc204d948b9ff629ad420ef995c5ac850742db1804eb16a910fafc218c483870f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_9CE832D646FBAFC5C4ACFC523FDD84AD
Filesize402B
MD5a2a476fd95372aa08ad3bca5364999a8
SHA15b58e3d84cd3cc6012101fedf1b6fb374a38d93e
SHA256b63440231c1586de8e869c43019ca20fa304674345829f265f684dd2d926b536
SHA5127f35abab4365aeb633c71a51c3e9a7eeb12a4c76b11944023dfde2231e5f5e5f452c7a4232e5936749b73ee2e3e3e613e8a99ccf440aec038104c734d3acbad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d45ba69d19c91016f16a5aa08f82840e
SHA1147c13845aec941c8c121f8956ebfe7a5b20342a
SHA256d4b43b916c29376f2e8a479667347980ae1ccdf85dafb88404718df12c293ad8
SHA5120d9a9ca6a63af6c90d2bd90a4ffa49f187a434d61e701827e9f7798bb29f51483447975410e55808bbb0f63a94a5931ad72c989a143b1013502f9945bcfc0246
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b