Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 10:03
Static task
static1
Behavioral task
behavioral1
Sample
fc0ed5d503d5090165a59a4e1ee07211_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc0ed5d503d5090165a59a4e1ee07211_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc0ed5d503d5090165a59a4e1ee07211_JaffaCakes118.html
-
Size
29KB
-
MD5
fc0ed5d503d5090165a59a4e1ee07211
-
SHA1
0dfb7f1951637b4f8e6a8c7d48c7407e0c4d6612
-
SHA256
8acebca9a2a3106e0ef333bfe2d6c2a4e29a28d0d119fc7330aac001e139b076
-
SHA512
550170496997d2c2c5b5eafe7b69067041f7ac35a0df8c6c9f5b0378336b77fe3ce59f3bc568c46a38ae04935a9203ebea16f14e375760f0676684ddca9a3545
-
SSDEEP
768:enMfDZsz3+gWJq41JoHE4TfWpIiPW+TRLMEY+ojFF0F3omR5K+AIkAoFgHdkx9gl:enMrZsqVX1Jsf4SZxzWAbaj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E33749C1-7D80-11EF-9303-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433679666" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000f5b05e253b70ea5b2203b3f7f5db1e76f4c67bb59750e9a2ea3560498efc1371000000000e800000000200002000000004f3c4ce4daf82ca769e5e6c057a095785f5942c06224a03b024794097300bb62000000003fd6ecee474525209d87c8612a1a5b63f8510bd3d964700bf70480feace4896400000009521ddfc2a7c56d32ae42733434a8e95342a28441ce8634bd48ab0257fd6e5801c352a5b86b1ae3483c951f09276232599e7b6fc1f8abe7c14bd203eed862a2e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0cca7b78d11db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 1216 2520 iexplore.exe 30 PID 2520 wrote to memory of 1216 2520 iexplore.exe 30 PID 2520 wrote to memory of 1216 2520 iexplore.exe 30 PID 2520 wrote to memory of 1216 2520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc0ed5d503d5090165a59a4e1ee07211_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa2da7fd45227f2c241843d359aaf900
SHA1927d930bc0c83fbacc8b9d934a3291708112c2de
SHA2564bea3362bb0bbcdd36a62d26c8f2440dcff201d4ecaa08da02510c5552fc0171
SHA5125fd995d9a96be5b2420b279e6efb068a6633d47b111b48fe46fc2a8be274c93770edf7f18d647fb80dcc58ef8e5d66f94b8d30948b570e36dd364a5fdf971fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc326da7cd014d319c2e98bdd23097f7
SHA146cf6cdd14035e74b32b1ea807b1c9c36421943d
SHA2568e9ace0108ee440ac9ce7100a408fefae80978122db4419264cd4e150ac3ded5
SHA5126201fcdff95c80e2a89956ef618d65e54e05663b155b0e688e38a63ce6e8e08cdf93600044a5b62cb31cc13e3d5d494854f49d3d448d0c30edcd5dd641f4db62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5029bb48f4a7bf14da3463fe5a1ed72ac
SHA16d38b721644ed477cfe3aca92ffc63dfd02ec0f9
SHA256e585bd417380ecb9c7519058347e7061ad6623dc96ecd9f7a54d53dd147862f7
SHA51248b47a2d7dce115910fb6c9eda9f466c8366c0c3e9fae9286d525250d948a9b0110b77ab8190cd496676c81dd5bb83ac1e5f94c01a8aa7945bbef96e5af562bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba66f7956a390070e34813e192077263
SHA17261085f759ac4f94f748b6e390dc6a2921dae96
SHA256d2135d3c45b07839f1cebb05cf083cfad092fc8b65061d1d7d1270e44dc4d869
SHA5122866bc38d7f74b503601df0efad73856aa9560e1a5066c5a666773e6e7bba5eed32cbaac7295e7b8ce38c16ece273f33d56e81c6935f9c6c69d0d3d7cca788d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a15b431b16e4a409c196f69c60588fd7
SHA18f85b6e12ac8a4208b26c83a3d63e5c6d828482b
SHA256129a0ee6170e92f41ebf90b24c75abab451bc2aa2da14baa89bf31d0a99fe9d7
SHA512feb7217f129b035ae07377f9a1389d99356b4a80cdb29f1d7f59b420461dc9044c562670c1b8cccddd0209508ae81834785372f35cb053b53d4a7ac4cec3f3f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b286a9093967b6f42bd59d4166f5d9da
SHA13849b0e71fc5fb69a71b9b5427bb6ecc7d27de44
SHA256edb02787870eb04466617cea2b80b2d8836e485324adc92e2bcc6c4c3b0a006f
SHA512c4c1a72b50428d3fde3687d88d4bf4cd01faa3604b2a180f60ea73a2b714546cc85338df9a56949792b5b9bc344b64e72d6968b1c0bb30e694a31955f306be05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598caa1eb50176cbdd1d248952e48da6a
SHA1f85b0dd4646c94829fb6939583ed50061aab7eeb
SHA256e3c8cdb3c8d58b2fae7de8261022b77ad86cd3916e01bc44a88e8096edf74f32
SHA5121caacc4bbeeb0e5ee2e9e1c964f0326de72db0d1124a153783506815f518d3085619f863f11417ef3a468a72eb3cd7af46b31ca07c7b1ab9403f730aec986bae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d49fa92b68a5fa8fc79ebb5a26657c2
SHA1a690689e13f007dc1b55bfc586302c336e86efdc
SHA2568316d341005f1595b95d833dad43561d404a88da55ba5c4a7cd1db1dbb51a0c2
SHA5120d3c0deaaf01bafc977386d1ad01511fab81226baeb740fc5ca4e6eb978bdad5d7e712fdde01d5d021ff2f8061319bca252c296104f1b2c63b2b4a8218d9ec42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5768dab4f8e76f8bce0caf2c7233a6c3d
SHA135272f7bbb03dcd893d655166396f4c8c4506256
SHA256ba0fd35f24a041dec017f9eb4d4993857eec1af2031bafd2b2e5003a2f3214e8
SHA5124a860fe106bc7fb4ddda45b3ba0bb45a6f7a9a8097280f13a04fe5b28d2fd9c33a8c2eb1a96bfc456b415376342a8940aedd221ef861da5b40a109bd2df97c99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb124e9b633cafdfc1025b5b5b3cca1b
SHA1f750cb9f7b9b83700b0ff8b7b3cb01620b2049a2
SHA256340dba9139a8bbd77ad5b3a338188b709dd41ca0f67e99b9c863cc787ef16b9c
SHA512397a7a7ac28f5d8f8c7fbc9472d6c6c7dcf349f422282cb063460dea5d4458aac7ec7b6b82fc8ed23777575fcdec43a338f43c14c992d27277ddd7040142c8d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5133cf986e3f56a5a99cff921655175e4
SHA151757e91c81049fd1d08943efd2f817af9e1eeb9
SHA2564bedae87d282813d27c4eb5c7c8cefcf4bc049d32fd78ec362699a57bb7fd832
SHA5127822d8d6837c41219a3625d95abeb00d4977f0fc12d761fd2aa6bbcecfc6cd07e99a447e00dc66b8d77e148c1141bb6b250a168ef4d78a98398e9e665082fa81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516950205f9ad990ebca5daa14b0c76b3
SHA1e9226baf5ac2aaa73ec50adbda267d9487593de7
SHA2568f2ae524b43e36819db4fffe242401a8585cc5dfb6a44d60649f7fb2148f70c8
SHA512e398e2071ddb0e3399eff0b0c77a15f4fb42392185d26d4b863c9b5c7e1c747a45c863c8c564395040a7e450a8f6e88c891f48f3a66d3b773d408c6843bf5400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57da9a7c9a74bc746de88ce3fd913e1ff
SHA13abebe55a358c837116d64a987a485fcac5d80a2
SHA256aa0e518c2f43a4f852bb9e5b81c1fc45c57103b2a12fcf7d842dac875c372912
SHA512c7a9273d4961bdb8acbf211443e41345fa31ea6fd98f1a1cf19ddf355e7ea14fb060855a0ccc044c645078470b140a7ed6c47a5da80765f75fc55c2b3c456645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8db6ca8b9fe3df15b79746eb65ff37a
SHA1c0ab61ffdc99d1803e4ed976579c5a8c18c7bdf6
SHA25658024673fe05adc8bd557deb6a496b8c5bec0731d4100d81f32675b951dc0814
SHA512751353c99342affa411012f41327096915a3521e1446c8737875ba1638d4ad8aa5e5994083c453f77fdbb97616956a1ba1af1bb32d9c5bd5554e97b7fb71c7e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505124211a5e795a983180f2b17efc590
SHA1ad4de4522be2ffeae22dc9cdb8b1ca19a7368f56
SHA2569b8aae84e0c5d7c946baab76eb7ef182bcb1651ef2b4fa1470a8857afd912aaa
SHA5120e1f17610bd606b59e7e7f9b21537856b2127fb4f965e9da5d4e00dd46c37ab0139de81c1ea9d4486493c136655e335ba78dc3a05870d974da560575cb9f05a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a0e643d511e2359f9252b84fcd157fb
SHA144f51f741a2c13639cc13d638c0aa4bf9523cb32
SHA256a7cf2019490b44657bdcbbaf48a2a1f0f277daf877f6e97ade18a7a7aff48b30
SHA5124b65becfb90ab1559e12b84738dc0735f2f2d17f100705e1ea4b7e1afbaa806b004bf488bf8f4a15d583a9d6a9e4424e80b5c17b84d3f97fbb6757737e2799a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5770d0fbc23f82be2899ce6fa39d5d35c
SHA1bc32ab896c4563fc8e8bddc2132bcc1eb3425877
SHA25651cd87544fe8a0910b8f1be3f2f2a41f51d9cceb35bd67db1465e1d5837c9af7
SHA512ee573cf35dce6c24473c2aafb72d7d45d7e5e8823808182752222fb809a71427794ace7d6acffbd01b30db025cdc215cc18b4d540f686ea5557ce570f26bbad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab8ce6be1625a5bbd1fcdf8a0075ad68
SHA1aead6f3c63a1df8f1d376865c5eac5525b419525
SHA25656490d4ad47d9c1068b7836be77026e9c588c38d51ecf3b6b0b9055a82fe4175
SHA5129ec049979660a00b3a5cce6073a4aed0f8c396c56847fae755000bea4c0cb0abe2c55b0118d23b3c86ae687d1135d2629397b22aec30e4b181f71212ff840de0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593224adad50957ff729f20c871030264
SHA1a3072c4b89505926806ec4b0d6e81e78a120bf49
SHA256da956456cc24a0b1eb276ca391603a1026194d1e6344900ee8515f543596eac6
SHA512a3bbceb11f73ad72c318cfaf709c5552131fe20e6d44cf75232d85f5204f8ea87dc6544aa614e68af487839c231d4ea1372d5caba7e9c17fab8e19aefd46a9a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5752e51d50587a9dcc9e2c21eb3f543f6
SHA169543ae11b49d506f27c3987afe6a64c0959ab5a
SHA256a5b1dd0ab32ed538f23090418052e4f4e302d29f00f8295f1509b29f625ba621
SHA512f06978751eeb452c423aa321e64904499c9cf3574b138e9fc2e925603043eb7781cc0e1656decc8aeb586dfd07d953fa53149cec30e253fa59abf63a94dc46f6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b