Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 03:47
Static task
static1
Behavioral task
behavioral1
Sample
ce93c087f700609a48dda63a993af81c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ce93c087f700609a48dda63a993af81c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce93c087f700609a48dda63a993af81c_JaffaCakes118.html
-
Size
31KB
-
MD5
ce93c087f700609a48dda63a993af81c
-
SHA1
8c8304384feb408a9811451dc6531b7822fb26cc
-
SHA256
00159f21752ed05a6ae5af196b3d1c224810f7020103c6c99e9aae266d3f2407
-
SHA512
b86d726c60ce3918a527f55269a83f229e85b3e0e212ce2f277bd6ed361c26b66baca256643cbb863f230d361bda1d41ed2d825ed5b3c1f116c5dd0b0ad2989c
-
SSDEEP
192:uwD3Sb5nenQjxn5Q/rnQieSNnWnQOkEntBtnQTbnpnQmSJxtv9/8rComChpD55nj:iQ/bixcrCgUC+mX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA6805E1-6C02-11EF-85B7-D6CBE06212A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c09bdfa00f00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431756339" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000002ea1ff188286dcf0f3dc16dd78ecb36d775a386467885759a49f4e1096ef9715000000000e8000000002000020000000552b15f7e13c9dcd3648a963c4043e6bdddd6aea6531f50b75ca7344c73c8d6320000000c938f20033d3f68bb51150a2831fcda3c20229862f9262e5917c18f9749baf4f40000000bb11a3cab9fb87d6bec9ce66da45012500f99382ae0cb5d87b5c2c02a6d6a3bfccbc07bd2a292313da6f22cbe93fea27bb421a2de6e716207be748697b455360 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 iexplore.exe 3036 iexplore.exe 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 1936 3036 iexplore.exe 30 PID 3036 wrote to memory of 1936 3036 iexplore.exe 30 PID 3036 wrote to memory of 1936 3036 iexplore.exe 30 PID 3036 wrote to memory of 1936 3036 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce93c087f700609a48dda63a993af81c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581feb7e1bd02d0c54f80edd339e7ed4b
SHA11d688c0bd371378055fb91f48eac716615677756
SHA25662b963f64d9c002e929c70a536f0fe54ca4738b5f27945ec0c90cdefd0ccf649
SHA5127a0a1d99b3e96d0aec1b3722807b80c2a309a8187912ff2f0e122d6cad929ccbae5d2ef7ba9f6215ac46952dd6781c65b54b265e3fd314c647769848cb5c4669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adb13d54d7dabf5ff5dce1ce36dec298
SHA10a72c6a5f7505d97497b351a9e5f2e7938220b07
SHA25665d3eaabf9c9651a3301ed97ee7ed09a39a6f25a28b0b55e02485826ed311b44
SHA5126e0ab425d508a0e1c13fc812b331b544ab76f2d394c20663865b296186e6a380b6fdf3fe719a53629a85660f9feb8d6cecdcf7e3dd440670e7f087b8de33307d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad37e3846bd7da5a8d471bb9dc2b379a
SHA12738145b55a850254724c82c995eab9c3d486305
SHA256bce59c2e7ba9596ee3e120d6e8f3cee56434439518e93c182b14bdd63ff5dbe7
SHA5129691a73f75b7ffee95b2996bdb5dfb8e28dc7ee81e2118a33c05f99c1f40317c6831c4a391b55ca60d3164ced7ff297792bc15ecdb482cf2d78497e1acdc9cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dfa9a4f23bac862d604c223d53ca936
SHA145282f33703589829c750fe701047ec8e871695f
SHA256f144e86e0ed1c2b5e77670e3534b5d0ce746c4e9fb4df8c3afe606db8c93fd25
SHA5120969aee8f5fd5a1866bba2f78b271b690f9041d1230ee8a63ce285ba0d6a88cefe323797c2956080760d1d03724f07c109c95eef9dcc51422c1fa11344b59c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e4005cbb6fbfa98dd37bc67471612e0
SHA161f112c39838b55d103d97de58c65ecca6ea9dfa
SHA256bad3789a03b3768f4f955ffaea49eae9a6c8673d50ac398e06d17cf1ea8c3e25
SHA512ed339b8ac9670d828a740042aa4d69321d12a15e30ef5a0d85fb248a7677297ab0745d5d5d409a65af2d202963e87171a8b225d9822a7fceaf6dadebb4de8060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52093411995e15549617eccfc6eaf34e7
SHA18ad1fbf5865f33d5ee59623719090db32c11b62c
SHA2566798c9ff30d2f7406f9ed7104ae1f71f4ced7ac3cf0945767ddd87a74d0e87c4
SHA512f873bb293ae6182d4d4ed382e07b32bf804a944f76e5b8b43ae3e9fcaeff1c628df50536296d0d40e0d5d3027b10b238f649120853f8597e507491c5c27f2a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e79e8d5f29a5e1d85d8b3b37b522a94c
SHA13106d3336e4003b56259fe8f8a10689face47642
SHA25620b9647867843a9941a1907611f24bcf431bd4bcce2838a91056f33b2fa9cf52
SHA5129c9ae218b8ebf49e9e23d438ef440c0003c1cb3b54fafd2a2cae89ecc18bbc762a161c96d0ff15dd894bcb217b0dedb94ee871436d078d2e1319897b60a13583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b28c11d6c7f66da1879d16b3b8161bfa
SHA1308742aaeb055b68e6c5d4a9af9619415c375607
SHA2567898e75fd6642d6e9a9b48846db9f5cdca108421d362495c624aa7c5684caadf
SHA5121f9c2b81604c2e231cef0c3914db2c0450df583ed3624aa80e80abee07bffe95d2cc42c6cae858d599a40feab420a919946c2311c9a40ec2966d4fc3a2218a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f75b287466d44ccf9d09891e208f523
SHA115781a6c94a15d6e47c6a7809d76caccfc500bc4
SHA256271fa943ad919aac4251fb2f5e3cfd91f012ac4c3efcd6925a64d1809cd15304
SHA5120f717eb2bbb949a1a735a7f1abe24cc41e31814380a5ebb7a02c62f2683e7b14912a80b19753f4026bb128d7df7ee5072556e2666d291afa1134e09bf428fa70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5804596b9ce3459284852a06182bcdb96
SHA12d823abf44cc1efcceca38c2ab9aeac3d52c9d77
SHA256710edd93204bff6c102ff3289b8245b387b591409a0a101b9b498390345a8f01
SHA512c37ea8c72d8f0bc4deaa80b124e30e166f1015f2840ca0a27a3c5b9a1fa832c3ed99d8a71f84722808ed80210b1258f6e95339c5ee84439a37d1da9200109d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6e95191fb78254b9fd74965da19ecf5
SHA1c176ebd11ef0efa36f2afa9efdc69515a5e0b22c
SHA25615df27d753d04485475a7bca2a19f26b992b840ba8f58c7b0363312c231075f5
SHA512d81997b4957f495ae0154916bb1f8324605509caef11331b5a9f42529f5f9f04bdaf3c5450671586b1016f4101e663df21079ddcf3a30fff9dfbdfcd8ceb9a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544a63f42263a788322987ab66a55dbd0
SHA119718f874131869c12eca7a09bad5f3e590e93b4
SHA256e4aa7c1095f014f1316fc3b90f69176e5938bc5868031e6895b6febc80462783
SHA5123f62def41cb8912a307f632038f2e7e9cf36b46a0bf48b837af88ae023f4d7dbf14c09a83ec1f29ea6ddc24efa99f98178773f69ad6db086e30f1c1dd1340b86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5050d9b24d0e817b565b9aa8fb0bff071
SHA1ce07eb114bac8e086db5c64324a61172087886a8
SHA2562ae507d664029497a622cd0c50daf1710b3db0117e3f21c1969ebbab548a9254
SHA512f7fd02b78019dda25afc72f918aa9f777e331906299101bc35c53e86746c2e5f86eb6e9978cdce24ae99f3a8fe16e1a872ac942411245869a4eeb69b08a93b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550c0e655f84be81b161c8a6b315c8a76
SHA16023bbb635585313777dc2856cc46ffd6e8d1156
SHA25682cee451468746a3efbd271610c21c6b0ac3afc8317f82a65175bb672fc080ec
SHA5125e92398b0901abc413bb7a9d7cc9c3477f418646caa8c2f864d077f80445ec08cf2bff76c75e5b874e392879a78be8a365d1d77580e8a9158865fea0e4c29d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559b824c49d311964f2f82a85a39191ba
SHA1d0fe443d926ca0d8f5922b57d11203618e90ad49
SHA256c283105619fda690be0fe46a81795a1d4c3744ba59779609783430aec83d76c5
SHA5128f1ff4c8d38c60cc5eaf7bbd4e2c963c390595e5e71c970e9ea5d4d9da436f943cea84aea2cc4f204c2da9e67f8b718f53ba3040c33db619debec4e24e0fb8f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57989a5ebe73cce78b020f09194f7a706
SHA148daaca2f3e0b8bb1d6fce23f267e84f564a3491
SHA2568b3355a42bb5d934a062ee4fc377e6a2bcd55def0eb16f229aa68c01273508c1
SHA51220671d20b1baa368275fef998795ab27fe9b84f5fa7a6e95ef209c3c32ff98a123750afbf51120048e58a6d3d19aaa8d4eb5baae80896fcbac9b55848f4472a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569d51c7ec02a322f571ec3c78cf97334
SHA184f0ca931fe83a610d3c369c29e1130341952959
SHA25668e290cc9017cdaea70643ec720367f7ad8d263d504ade05d6216e983bf508ef
SHA512cf617f0054f1d5a8b79657df625f1bd1ca6b0a225256733f074c60b9479fef0f9cc8e02bf2803cc12f8e05c591970a90292c21b04488a9dabb5aa8d22dc6f786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ec5e825af5e5a7fe56974941000eccf
SHA17b70873136221504152db64a14b80abddee3d2d5
SHA256e185b8fe612996e5d583e4edae358eb10513b3e47a12f95750bc8640cbb06556
SHA512d3ed24c1c6a907fd318cf186037dd933beb811270ad23596491363161316db00845de74ebcac01a44cc7ffb81848675eb1c2e8055875a94f3ad8939531a8f02f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5431b1201ed1a712a19e196dd86166568
SHA1ddf789b6dafd4e3965cb37c4938bf51af794b638
SHA2562727b8dbfe2e3faa7e36f3d8532b5490d5a33c3864bb722e583ec096a456a879
SHA512058626ff5124a1757a6f0d46498278e723751440be48800a7dc0fe17d97f45f85abfe353e6a9bb4f225c57e255961b9cf4bb0cd05291a0f258214b518617713e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b