Analysis
-
max time kernel
118s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
d0ac5260f93560a5df90e78de93a191b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0ac5260f93560a5df90e78de93a191b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0ac5260f93560a5df90e78de93a191b_JaffaCakes118.html
-
Size
2KB
-
MD5
d0ac5260f93560a5df90e78de93a191b
-
SHA1
360faa168b52e86064cd16b76379c7b4a48ce0f0
-
SHA256
b887deca0b8ae3e686fe2ca9727736522975b90db1d3bdc34ebfb5e84bd4d349
-
SHA512
5b82b81f311a6e764b01d622f4c81df9380ec02f92f1f4bde1a97d024532eca397bfef4f79e696e56328cbae75ad0eb824a92fc49f1249abf7e9aac86ee6dfa5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B374A931-6CAA-11EF-809B-F2DF7204BD4F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000009961fc29bba00e8ca537c28f03394d23d3d69588d1063ab8af0991f18a85f51f000000000e8000000002000020000000289f1ebb8b1ed16b8feb75b2d7cfa74b708bb945c33bbf485f4e335a22a6daf820000000e124f48f2926e1203514124fc2a2214914c2105bb683c21631d37eed5a180b6d400000009df9b8e98c42e4684d436c20512a8689ee28f9e6cd07880af51ab4a19d533fb9e3e048ef4052863ab22c699e8484e9a117d4d9633ca7e658623b28807963ea41 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431828467" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70bc0d8bb700db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000162c62a3cc279cc9a21b601eb258328eee9061f46b233cb53c82b4157c1cfc6a000000000e80000000020000200000003b78bd378ef65d95facdea3de0dc5fda9aaba577199ce75ff3e469d00712896c900000004ffca7f269acf5be0a3bab0b761a885a7a8cdee3ff72ace6f8539b455a6f763bde29516f8df3b71a77e024d220c56bcfc6c29dc12da43a55ae25b0006e30a2a4c85fa3a6854a944fb883e0c4d6b4127bddaa2bc8758d67827f5a1ee7ede8306390e10cb62f16f629dd14c59fe113236bcfaa355fa44b8a58bb8c43e613c8644f246176460bd0cd6fa6e99d109be448b14000000002149dcb87a81cf51809693b46506dd963ca332ea3cdb2ee659f1d569919d01d2bb42830b30e5bea6752a70ee0be61ab4ff9c4bc94697aa70083a8346ba8a07c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2420 2116 iexplore.exe 30 PID 2116 wrote to memory of 2420 2116 iexplore.exe 30 PID 2116 wrote to memory of 2420 2116 iexplore.exe 30 PID 2116 wrote to memory of 2420 2116 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d0ac5260f93560a5df90e78de93a191b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558daba6985df2112e336ada3fda09ea5
SHA19a694bc2bd21e14c59cf901d0fdc817aca75abfe
SHA25675bf01902f6d95b004c6cc4bae04afa08f06b18739c25e4b0fe636d64c19691b
SHA512b5164cea21a5fc44d6999e65606b64026bcdf1bf092ea4cb39733ed1781589e39006c3d6809eaddae9527e2bd18611bdb27c1a0dc7dc65e9b6b95c8ad1c6d80d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564539ca08b3494f5deacdaa8e072af36
SHA1c4e386712dbb5048bd6cc45212098ca7c594be5a
SHA2567bba2267f4ea9f58ec248620d47093aedf76eade344a67638f6bbaf2102aade4
SHA5122c0a4ff2db124f8e3e626f36c7d5afaf691533e64d259ff987dc409daa69800c9a258330b7b5a403d514b0526d809bd900b5abd7c81f0ea5b1b24db6a293e4a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da8a97466d3240a8ea2cc9f5d2497a97
SHA1a3880849838c90ebaf66c9e5241631dd07b00f5e
SHA2567b274150bfdcae9493a73405c6228605acad65837e837ad0b17f63d28d8905d6
SHA512404d56432156e0442a89997ccb7823306c000c77db688c74e08d56d6005d6ae42e05fc19b837d59e13719fe4bf5a296ccd1daf83ea975cd90ddec9b1844bd743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3580b1b697d2972a3e99f71e7623c34
SHA1b17d0efa6780477a2de5d8cfe1cc0c516423304a
SHA2566039e9a65986176340ec68ac1a55ce20fda775f565d2070387e6feef3cbb50ea
SHA5123fdb92940bf6688fdec5c9c1e90e098eac392d071da6a6114fa31dc76d7cad679bbb567795a89ce6970e1b92959cc1579d2c7bb5b899e1bd682efc735e1c15aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512bfd3a9441bb36f7f021d9fe50d5e64
SHA1cbc9231dcfce348d1e8c56119978f1f8a5f7e443
SHA256106ef3cc890c86a483881a4b5d464b14113a5980a88a6b228eb495ea9d4017ff
SHA5120a13aa431b13abe4b71f1d6b7450cefa2feb3a37ede2c78e5fd41fe113e1ba2d5a534b69e47f8f4ffdb4d45c207d17a5856744569d9fa8fdd8ac53dbab02df4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501b03a1aa5be9b4de471e1577db8d378
SHA176c4253fb292c35b5eb6e79a22f8bf13403a444d
SHA256f7209b916382b20202eaa0b91c0d671bc0536cb3957c2298672a53b49333c801
SHA512bdf54261c3037da7cbe6e651d2ff4128828717b7b90baab98aa03fb5676d7ed33c246c9bd1f098c8e5d31ad40d1dd4dfb7c1cf3dadc45945057a742f6a2a3ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e7721bf9f200d5346805a7ab50b19e8
SHA19519202adc07d0cc5e425e55317aad112c0cefd4
SHA256d26cfc2e2f80f118a7538ee5baf80abf2827eec313a6902c831f9709be10d90b
SHA512cae9a5aee3570400c4977ef4d888e93b159e146fa7f81bd06b0df1e518deea0b90f1ce858094f57878eebab9ac88cc2c0b96ebcb9d97f784a244d9920c6d3547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537c2a8e47819e81b4688fa7263603005
SHA1944e085f23fe1e8885ba3c0e42823d4e9e82b48e
SHA2565e48805c1ac83654bfc5d337a3ec8e4ea885ac8d2ff19c72eca2eab8b3513abe
SHA5124ef7dd57ecfcf6e2beca3d7d775238c12f0aee8a34579e5ef65ee014fef882ed55b4aea1f2b3e3fee00f6b248e6ddd763ab932921d148866ecf6be0c40e66806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e83fd28a59f4e72e144ff13ec70d372
SHA161af3bb20cf92e7a804cfca74a80c0e4f9f5961d
SHA256eb279a66886f8adf9e5bea01b225edf3691dc6210f5d5cc23f9d1a188baf73d4
SHA5126bdd5276621abef43afda1a213775b7bbef599840b387d2c1549bb764f14cf8fa6daeb920d535ab20e691d3991ec555b4439b0f284eabf76d63a01deb282b036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbc5db3002c98281784c2240282108ff
SHA1a0ec33ff0e76fb175d7699baa422f9059911c6fe
SHA2560b0a6fb261147d17072dde3f5c5348d74234766a0a3ef650b144160babc31727
SHA512e509c45eb7262893c45325c297487bd3bca55bc40533440a114d20ed9d9eaa7f9d0fa6629cd5035080970159e27391f2a4aeefa37728bf6144b6f457f8ef38f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c1600fc0087b200e83f59f6ec9f9afa
SHA1339ec774b48a38c9d184ef5b5138cd0f7d8c390b
SHA2566878fd57bfc0ea47469e365aad46270830160e6dda551bde0443cf8e73a620a2
SHA512f21c5720573599a363c6b28f7740b2134f2d39e214f4627ddceb1fc67ff9b0f2da389b385c3aecd6ac223628a58c5a8c1bb2008d9374405096f6dbd0666693b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5434aa64abb56fb2604cf58377d9b66ae
SHA1e45567a2de68196b9de73004d1b64537b82d78df
SHA256775d9df4ed6ee963769ff8f961edbf8052d63c7f2d6ddaa16b082fec97d3e9ff
SHA51281d40e35e2e298347bb99b13db1193af0cf17e66c11a92bc2655830cff16721bc8c2366d0e214b364950129bca7b8aec062277df369dd51936639929b811c46c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da71cd95ba619f5d0a498187c9e1582a
SHA1ef7c2a167d7361a67dd3d3296a995f2414293ecd
SHA256c6d38b135855ff8f79e0c6580e95a9a91ebd3fd79339cb6ab62de98e83288588
SHA51220a32baea94d2516075f52b7dfc774fc440648cb52c3d3b631e3982aaa49828f22dd935f78fcc42eff160dae4203811569ef82e5dde09cac9c2f7b70afee7795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5941b1562b8dfa7b38a615efe8f4a39fa
SHA125f3518ba59476440ba58e1215bee74bf9e3115c
SHA256df1d8dbe40d506cf8f386b50e9efd35536f60461380b4f7f1aa29695513eb82e
SHA51271b9826d48386706149db776d3e53a1bef68c53cfdad88120aebfbc9517bb00b739423f0443b0e103cd88b30c50fb3f5f4adfad1bf1194a5a075286addc48c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59592a0c57df2b1650f365c07e0922c59
SHA1e0a709086482a63d942c012d8b304530feab8c1c
SHA25695dac3811aca30f954bc4c252a714e342d2752788d2e78b0dc853c625618efe9
SHA512c6ca618f11ee5f487bdf566942802b98f07c6b85082e9bb7e1eaf4b102ded8b434ddb2100868234e4fe6cbf28fca0ed7c72b01f2e386c69fb46a1391745a4a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57603c83259b3a9c8159a9d7221643781
SHA1c8973707d04bc28fe75155d7aefcd0f83d1d9fdd
SHA256b826c4cac428e35c454f61b5389b02f798fc0b9c19b4842f702414d567d0742e
SHA5126142296df159d433acd881b50e845b8fc99c787285837e1a2213d4cbe2893f595acdd0c48fed88a0de36190cf523df3aad3b96d117e2767ff4356806d3f23bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bbd7c298fd6a541160b9f356fce83fe
SHA19284cf51352f68c643aff020784b5ade660789eb
SHA2566ff9838a36b286c66c124c4f7defbd1d06f24ce0a1072f925149d25a7960aa1f
SHA512af4267108c89bb73eb2f43ceee0ea2721368e92751ff7212a4452030dd1b9ff93e50e13e4685c084dace3e605845e83ea5e08fc9c7a32708178b8532ab9d8e1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f47e5bafccc0a2d22664d188f040255
SHA11313a1a0873c9e5e5b2ac0cfd02b403e1b349097
SHA256650240903d0db1aeaac60205662a9ef43b7b693fe25cc31dd1143705b1350d3f
SHA512188a1eface2006b1675dc97b9631df20412bf5296d841ab168d6050363f5b4603b8bb9e5eed80344113115a28caf2a5dfa794ae31604dfaa2f56ca805ba7ec16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b65f0ebe06ca89d8c6aa1543292c1ad1
SHA17e14f850e02f69a5cb545e14678f231ca7d87a42
SHA25619643a81168bfd76ecd7d182a84213a4bf66a4e9bae30a33fd8bac9f813865b6
SHA512f12edc177a5160f7631d6ce8b3ebdc1a1a770d38737696aa2bde525a65782ee59f6df14f99b706b659ddeb4d8fd2eb9b26193f9a59e7a18dbd1a97923b779f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598eda048645151d61a77615ca511451c
SHA12b9bf32ea0a551cf65f1ba9af7f78a9d295df81d
SHA256cebb80056bda0bf39862888ad13ce0763c7d0382171c2da352bd45795d86b4d4
SHA512724f60ead1481a33f4d7add9e768f2f966b7a56b1d7e837f272fd1d0091f1009962617e892debdd213c4221fcd9b7ee0bf3d9b251d607463ab1c2875033d5418
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b