Analysis
-
max time kernel
138s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
f70b9fff99fa711cce7cd89062edb3df_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f70b9fff99fa711cce7cd89062edb3df_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f70b9fff99fa711cce7cd89062edb3df_JaffaCakes118.html
-
Size
153KB
-
MD5
f70b9fff99fa711cce7cd89062edb3df
-
SHA1
dca6a5cb3e1f473e6524d47d5e8a8610d5e60acf
-
SHA256
23f98f5d8ffe0232ee701a088105864ab5f700dcaca52019a4841d13b1663ec9
-
SHA512
dd9199b26471a8a52bd5a9706154cf157e563f6d361826d32d2775e0876c354127ffed89ab104e8324a68ce95ced8718712fbafb9dcd41834c7af8745651a61e
-
SSDEEP
3072:STW43BZjFyfkMY+BES09JXAnyrZalI+YQ:STWlsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000050a90e2ee502ff56d6ca9784924e2f834fc489453703a020e47debb972dba87f000000000e80000000020000200000006fb86e167ab1839ec1c8badf18955514d64d7fa9a0b278b96b26205bda298b06200000005cbae0f0af06c4619ec35baf029870281a5c160fb4869bff02b5234e9a084f904000000099cf3472d27b85682c72be4cabbe2f5a60e006fa5c0a9da77a926782d09477ffaf5f46d296dee9dc5f9855336d0e5a223f4a462150ae960f14442a3705ea1421 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1780191-7B93-11EF-AE16-46BBF83CD43C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f050a0f5a00fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433467924" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2808 iexplore.exe 2808 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2840 2808 iexplore.exe 30 PID 2808 wrote to memory of 2840 2808 iexplore.exe 30 PID 2808 wrote to memory of 2840 2808 iexplore.exe 30 PID 2808 wrote to memory of 2840 2808 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f70b9fff99fa711cce7cd89062edb3df_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2808 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec9a5c1cac37664168adb25c2c5a3c1
SHA164c5ed16f8bf3746a19f8d0a0139b64f174293b1
SHA2567fd4f2ef24964b2981fe94e0965a7126e31ef9a208ff71bf8afa45d677cb5ddd
SHA5121a573e2e27602444d5bc1ebad54c3d38e71b68efded027897b78ace5144bd8ff0a87526d33328321a2014cb549a2e6aaef2560059e169981db9cc11a43015d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bdeeea16d53eccafd7acdeca44cb593
SHA132ee8c69c2b6c25081a1c88fdd495920c43962da
SHA25609dfd385f1ebc6e3efb90ba7fe4084fd7a9c00634eaa1ea2a2e7ab8a0cc5af42
SHA5129ddf2998193d6f26746a274ecda4bf5e5b1f03266f9fcf039750546c6051aedf304d3e5faabfa9d6b9bf56f3a2111eff10ae9936c600cc5448ef72074906c1db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e9a18ff1ce2afed435c14cecb467e5b
SHA1e99c2d17d45db3ccc36904c5fe44b4104b70373c
SHA2562ff2a678083778e4beead5781f97cab255e70f8f4f35a63b0e70428cf818055a
SHA512439692084e4d0d3679a74c6ff909a611d04d7f1bee608d5f924c489f344b738caec9bdf9725472b5b1ef6c1165f7707a28d61a92f9716fb7d2a3c9a981316dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2d75c6da3b860022f3e2a89edd3feb6
SHA16817874da9c0e7320f9e3c77cf082854ba4fd53a
SHA256fb94200ea636b475d67c193508bdcafef153e009a2a8c81471d3ec433013d839
SHA512c1ea17ecefe02d65af5fb24907eca4ca64f80e9e3d55c55c21e6da9d5dc32d14ef311bf2ebce15c5f0fa2d2e491cb8b402a581ae4191966fd995085c936851ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a7c6c084f456256ba25bcbf60ad9ea5
SHA180726457e778c1923709197ea65f6581d14a600a
SHA256f38d711ee2478e8ea7381a71519f77ea67d2ccf42dd45c476ca7ec9623eea2fe
SHA5128ead19af56ab88484fd020b5cb1623043eb29cdd32bf2c171cd276448e4e78718c9fe479cf5b3e3f1347a64a638b5bd88184f3de672e46e490d04ec473413791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cde0751866e2ea5cb44547d636b295ab
SHA13c711f81d920c5701765082a1d2f6af4790e2106
SHA256754382694497fa7558a581001b5dc5ce34bff23530d823d0f453c6968e99da50
SHA512c49f170717b88c14b96a73d92a68707a15b6cc94e464f7e17c641796125c412f806b8876d6e7fccc08832ad6bd38d93617e0c9c86e395881d9ae27447f96ebb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4bafd4120a408a65deca47ab08e561b
SHA160d074bb00b6c00a05e71a646c07016a4265317c
SHA2567761659fd6dc9f9e360b08abf952212653fe8bdfa733827c540f2c7eff59613a
SHA512bac80b8e01db7c297110a9ec3b7dbf91d11ce1b477da149be8ff6a6c860afed227dcaeffe70804097322dfc9325362fd1bfe123a348907e29ee890e02cc4bab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7822da2a04012748795800cb169d417
SHA1976be4067814be4ac9c68192b1e0390d52f8c6c6
SHA256e5e7484ae84ef510f7f49945c8ecbd0a6edff0c358b923f17c965949ed5eaeee
SHA512ba3c0f52809a5b01768c59c5b72591a80ed9cb654f8d912c6118637a9af20ee6a2a1139f4cc07371dc25daf4dc4dbd7a83a33c41495f6f34737fd2ab8b6cd6be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ebd8fc7cdedc99c487b1123b381bac7
SHA12a9e1a28bb5c839044b7410a23cee4084ec422ae
SHA25698b4c9866bfd3a13fa3b0771d4f474c5c8526391bc089acee1102a783b05ba33
SHA5124b08d188b57f70ef9532b200281904f0f593a21f2f81939b157d05cb7c0f023c2be13940c11634ab5ef79ad73bbf0bc85ae0e4f698c1412d600e1d0273ce03fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1cb256ef01d40a2056c159592eaa9d4
SHA1e0fdbd07c116c0636c8b4fb8d27297e4406a41ee
SHA25680e969222f7840bd1a8263d66a5795cc771728c11ce982167bf28910dbcb8092
SHA512b034ddc7219030f0d510591b3fff1bd649cc2a454e8b7cb92d5a2ab7197bbbe8c881e6d3231caf0ba79581ed8221b46d4df8f7f74b0041664beb15931e591158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545f8dba12dafe0ae3ec2bb6a2289d6bc
SHA1cd83f70121db5f2032cd5ef1a166e0739e24a277
SHA256d550006bc2f6bb7ed80b09738a7e3f0e5baadc0a1221eb665c41e9dfc977f160
SHA51258dd3c8f1a5f83d0bbf1840c3147d366810cada18b1d9a0b9ddaa5cfa675aa2e0df5bbda078e971823d116c2aca5766a8c73f4c6992380ab03d652f93dd7b8a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aadfee26bebd1b884987a4073046a21
SHA16a19390ae64bf7c831e6088ad2c74faa9d984012
SHA256e6ffdd5aa91ddcd2c2596b2277cac430e089d41af0eae218a5aaef5eb3c9ffdc
SHA51288fe9114a70b620ebaf11db4eca2b186cab2f7780f62c14092d439a6cb264631885ec8cea1bb7865efd6dc58f46f422e6e291d43ed88a665c58b6038437b8e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526316f4550aae0ea66d4e8d9a9c6825a
SHA1c3052237ed0ba5958c5f9d96110a8f9fbb7c0582
SHA25644b5b1c999bc3eef86d69874d13bf8cb20a974467002fbf01889d4dcbdd2fd9d
SHA51223f5287d0b6ccb271a7ce2f124968d2b5b5bcb12d1e7f24f25dbfd9c0c2e73be116091c8d11eb130a809cd2823c34b9ee228a33b0d2b6f940215c641d40ad081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51afc5d86c60672d3930d1b57ff1069a8
SHA1342995f3eea697e529d3c99d21df2b638632a8f5
SHA256b0fb17cebcfd9c545bdafeab2ae358cb6e073a170cf1e71d433b75715e6a4f96
SHA512f90fb1f184e2465c38d8236673ef1ead641d0292c4c7fa0f809324b41327c4b7e9b0a8a6c0c792f91f720f171a7acc7c775e34f82cbdd2cccc56ccc204c77dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f54ec99d162c6c52fd57c6af24c823
SHA17a0940f366c6d3bbb7ab6123219f23be0021f02f
SHA25625ae8b4d04a454793c13d1c033a7ab938650ae7aa2dcb06d67e1fa4ee5de0617
SHA512f472d119b830e10ebab129246cfcc19e73b81f264809fc8fc5e6e681905ebd5f7b0b8e15793ca157fa3443ee4f554e61cadd09b2808602218b6959823c7ae5ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c29fb1e77c4de33de018942bc99535b
SHA106787a60f8440e24b18f8ffe7d71536d12691721
SHA25609053ed64c0f20c816ce8f5555aa80600edeefc740d01e2e8bb26114a94fd76b
SHA512584414f259f4b81cce0400980d289c43e6f6245c0ea5f85272ae926173e65c8f6876b17ebf86506a1c92716a5b217bdac9f0abffcf1aa9eb849e68534c59b54e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509712f763f6528fd57039f732e83cf15
SHA1ad5d72a4eeb5f335f1c46589da8a760a5e0a6c56
SHA25659af98dcd5e025f64895a35a527e1f36d163c0306d97dae7f19b300529c08a53
SHA512cccad9e8f65b73fa3b134736831bd99ce86d2f88d996bb790368e10f9e03eba19776aae046d12f405920198cc9ba6c84bf2582ca2753fb86b847f9c180b0d219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d70b253591c3d23ad0f1ad7c57e0fbf0
SHA191549c956d54e98b1fe6b1e4fbee2e6006b7ce92
SHA2569f9608d10f5d337401fcd0cad15835d07880434f5de4c26d4372f9e213ff1d0a
SHA5126b61a7e04c48bc0453766e4f082ae07cd27c39c32756113c612842f06835565a84cbad9d8793fa6608b9b40353490f1a9bec398eb7cbe343c9e40ca9e90cef4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd0fe2f594c159804b51736bb91db108
SHA138f246f83f4051ab7d514465c3cbb49db6f86a2a
SHA2561836a262ce81c391f6790816bb37312268f553c491c961ff34572f66abd3fb56
SHA5126d58e4984a9bb8495d8dd93460654e0ee9cb771654c638a3a2470f6797dbd3378f132509f4a09aea5f9c2fec113013536f015436c58ae98c64e82963fa780bb0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b