Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 20:48
Static task
static1
Behavioral task
behavioral1
Sample
0c676d179d41217bf8f9238e48d6c55a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c676d179d41217bf8f9238e48d6c55a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0c676d179d41217bf8f9238e48d6c55a_JaffaCakes118.html
-
Size
70KB
-
MD5
0c676d179d41217bf8f9238e48d6c55a
-
SHA1
e04e9f8b7b5183a75537fd6f8c5cc72ff8257d1c
-
SHA256
ae4af76e00d9b3007a9db1addd74ca5a9dc463bb92afa9e0d12dd00e337b2af0
-
SHA512
4bd5002058e76212f34008d75aef0c541aa5bba664ae10961cd49fe44f8c5f2d096a5cd8ee026a44b4f1c50fc1bfa9bd204e863cdbe2b02ffade719c944e361c
-
SSDEEP
768:JiPgcMWR3sI2PDDnd0g6QsQ7Jp+oT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVz:J/SkzvTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B91D5DA1-80FF-11EF-8002-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000273f2328755f9fa22a1002719c0f2fdc032cc4dc85e9796f8466f35d648f4def000000000e80000000020000200000007ea5ce5e2096a9452a106e07f2956660092e0a5588ad9943d5ae025270fb33db900000005646bda442630cbb2bb010807a56a9a1e938fb1a9fdeb7fa348bb2059af4bbbff978f1188e7f63eb4e125b8f1a9c87bebad8020d4b8ca2aea83aa6d30076ebd819a35b80728dd7bffde37e4af57f1e8654963e7a564be4fd3444fbe6fd5871e50c23e0e4ec1e28228a8b3877252e9bd5de9c16a2bc35e7d43242eb874d3095f99c573276a19b46863dc54313d3ab023740000000a234dc30510b437afa42d42a78a054ab56142c3cbe615984b25c2d5e7acf679a55b3ccd78365ba9f146ca797e675d217cdcef9c7a4854f57e7c090f9b8d894de iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01f468f0c15db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434063996" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000093f64d8e7f9d9eeac5cab60a09a41aac49eb89dd81ec3fab4c06288085a9f483000000000e800000000200002000000052272f3f2f4c21df8e21ca15dae08cac63e4377f22f2cfe6ebecc1b6dfc4a2c3200000008214c365cae3cd4c4d698860712c4a44041a71cbdda600488174608bdd1d91a3400000008246346b278e69629bb092e308a3f3b4c723289e732628dfe54cb342a0f02232ea1288cd35b61055555a557005fb5333fca3e3bf835eed95b1b4fa7ec3ba1790 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2920 2168 iexplore.exe 30 PID 2168 wrote to memory of 2920 2168 iexplore.exe 30 PID 2168 wrote to memory of 2920 2168 iexplore.exe 30 PID 2168 wrote to memory of 2920 2168 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c676d179d41217bf8f9238e48d6c55a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd32d33fb22d88d2040666887cba3184
SHA137263eba35293efa8840faf0038f2e61920c3d9a
SHA256a3cf82858fd9b5340a8056909c786871d247259a74473b8edf6af743074307a0
SHA512469cfd9faedd2fd4cc529da186d38f98f3b87fa54e2acfcea8db4f90ae02b66ec79fe354119b2336027418da898d91937042ed89babe636842473d0a0ff822fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3c03563e43cdc1ac9643957e0e07aac
SHA11c28797893bdda15be9651bac8c136ab9f7d5717
SHA25668760f036c2da44227c2d698bd846e64f3aafc68641471f63c5eb61605bac6dc
SHA51231499d82a68ecc942bf0e43a2c0fb4fe4fcf911e48abe3b9a9eb92d12fe4e992c9c3e0162a51823306748a285d93fa41b5149302ec457978203cbbc6efd8dcbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d8e961b1361e458ce060f1f8fbbc0c8
SHA19fd6ca07ae75419eda4fb1e1b4f54367acc09bd9
SHA256c442a89f584fc58353f640c1f645866d3c19d54aa2e877259a3cb00301814f01
SHA5126dfb1b62a3ed09a4b0ee74d6a6d6b9c23c23803fb1d32cb72b7a6395ad29ac818c9bc30b833bc0c9335223719ad892e77317ce093f932451c0518ebd696e9e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b61e63e49e47e6481a4f1cfb3ebdac3
SHA1ce0fc851bb216e938c919ff49e76251e98731aca
SHA25677cb06fa5b1290683e44afab31baa8ef8c0bef9356c2a5c6f63a886735e9caf9
SHA5120b9b9063afb181b8dc65375b408cc1ed15c0541d1900d68bae5283c9a1bee84858d4676b82f3e92723b200ea7ebea601a4e8b7e1ee3ae0a1275edf7c16507660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565b793ee10d558dae841d82f4fb44676
SHA156c4bbd712e84d1a3676003871417a0238a82dc0
SHA2568f35322be0c892bf7037d84b4691b1fc51861a55da82cc10d8d6ec980fc39628
SHA5122bd37413a5fdae8191a148353291a667b93bce9fd06964cc5ef796a5675fc7ea8ed214e409963939cc093ba0607b0766e8de6f536406717145f58cacca36118e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507b25e8815cc9a3d76ac79869acda287
SHA16365811b21ea28eff3917f2682a8b3fe5371a449
SHA256edf24c0b2e9a8b69910990efe4ad0f45ae21c2895c6296d0fc2e034fa5f7dee2
SHA51271e3d34022d193a281e24f832066ade9fb20609ec784ae331baa413cca8fe84a3fe5e932ff21ba592e9dd819f3200a18f62c18b18ad38093c86ed53d28acdd2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad783904f339df5dc07ef3b26ebe03c
SHA17ca4bea3c9038a084a9f59413a7b37c75f5f901c
SHA256b87be9a04fecdc685f1734660857348d21d87eecef23325b3132845465cc8601
SHA51257f75ed2b4c5721708d7dc988557614aeb4e7eedc026825d005d265609f85a71542b36991876a5cf77563fd74774fb3bea4d02d39e638fe3903b851924b870f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502960665507ed420ed0acd174ed5d53b
SHA1e489ec8e1d11da84ca90a52f1566134ece6659ee
SHA256ae22d8e7f4bf361b321de885d19de810015fb1244ea68f9c7b04cb4e767ed79d
SHA512739c178314b7d07359b9c3928d427ad819305b8d4d3486bcd40d194d8291702b3458c7dd38bd562e576eed7a2d7fba810a449dec1e74901891681470cbc69e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5048dccffc6396fde678782a7f3d83aa0
SHA1d68e043307325b532deec99b93d22d58b9cafcbd
SHA256142af4544f99e8814762d88700d9ec449cc371a8265b9d3564e80e5e755a428f
SHA512d97331ef4d4dab471445c88e273651436b28a0fa7d27f3c41423b3d2bc4fc842f1ab522faa9f65372c31784d7a3fd069289d8aa45c4cc715fcf1a9ce2d54d02f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54334fd1c2fcfa6457e11e513b474bd52
SHA198d5c0d1e24d39899c55ae878592302a6ac54c60
SHA256c0d653b23a0241513ccc3e6cd1229c208c560bc11eba597104833d2a464c7edf
SHA512171fed5eab8ba5bc63eb6e99b5f16b1e22f19619ad7015c20df39553ad4ee2e53488813316fafc1372f0d3aa1ff0a20e8cc7b4ebd0790eebb933dce8e34b0b63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a3e21ddd8dc01775dcfc1f8eaed78b3
SHA1ed26caba4571b8533ee7fa083215e343103204ac
SHA256b3a6623f6a80ee0322a66ad5ee1fe4a282ca6c20078511a80c083ea9226094ef
SHA512b149be8bb26e7215424eb823db7a0815fa6ff960a60fc5a10a28cc7e743964785b7fda7f71a5a12121058c591df3f181248cfaaa2cca646da7594c56e9fab2fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509a254979e0e43477e0dcdf6ab9b1b8a
SHA146a51844e99d7224882b5b0d6a07ea0fe4741e2e
SHA2562a8d6d473854af902fc1626e8b7a34e01a53b6b419e1979c46d0187bfce93b23
SHA512fd212d3b03582b3591101aa12908cc6bab6ec4f637ba7300ea0b7efe7ab2a1f949955ef24a3b3bbf141d2cb18758f6655192162de8dbe77afb0604db101f9bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55583195959b678e89ae8c580047e364e
SHA1520229b8ebbdbe7efabd516fae41f1489d08677b
SHA256b6283e3512262416c24391ff4112d14387e46d6fc309b692b4f460244d7b4453
SHA5122c847d7ab5548d5cd036ffb0a4768d9e6b70b8f329ce84abd56a8475601830e7e1de38c34d5397a28afbd5351ec2e8541a0962e53eb83382185cf6aa344ddf62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae3cf07bce984c4c4b826777749306c3
SHA1e64f5ecf852a1fee0ab4ebdf9289ae0442c00135
SHA25680d32afc2b322fc6787fa0530a1c6bbce87db6adf44d1545f286d9dc74d4f17e
SHA512a9963fc96abc37ff46db16010f1546cb990d9548b1d5cacffd61b5d3d1afac208b9d3ef0a95029a1fe212d3e9813460e5bee40a9639f6e1f3017ce9605180845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5171f92eea79950429d5c8071485eff5b
SHA1824d595c61e7ed93fa70646306e2c686db690e0b
SHA256dad22e9cee65fb89b456e4d78606f5c46b7cb48482901bb600f25887ea236596
SHA51219a32f03613cc7ab2dbf1b4023b650de2ce5a91753352cee40051c4be4df1e37c5c40e96ead3732e70e3d1e998b28093909f94acac9d389ec1ef9da8f5c61d54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c25f8696a42e629292107663427145f2
SHA1ac29f635fa2e97447c37629f6f32e6fb1822cee6
SHA256896caf39f3c0b6ff3c4ec79b2aec45676720fd914ab790d870652f6960b9c1a8
SHA512a8d6aec43c9cd0ddfc20e2218cf70bfb9ca675de1873ed305d1d0d13a5e136687cc26386ed20ac349eeb88d4dda1f33ff960384269d323dca49a4f4f61138446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5018ab369a865a16425c6856bd3aa5d51
SHA1f04a046be6e9605db90338cd035dc29a44704dc4
SHA25655b642a452d27d28fa7bec65eb2b33d1a64e86d4ccc265b4e94b69bd29e9e7ce
SHA512e2e40f3597304e02c9711b976a32f7efcba76b0904787dc9af813e2e34cda04d4e2b112b47be76f615057fdd8b15d891fe7d43d31bee06b8de1c4189b2e58841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7cdc78dc75d77812c9af922647c8d92
SHA16465a69f128e79a5ba79ec6b3f5ff1dc2eac6b9a
SHA256d196cae0d27e051b33e0f38acaab679107e51e8d46f13752557fe4c59316e9ea
SHA51296cfbce041b28e38f50f440e4a565ccef8f022ee492ca731a6a4d1a441a09e6a9b35569f13b858776d025e931a675648438be19d6da88cdce06b2d142efec153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a90cfe29ec2e5987dd684ee33043c51
SHA132b59cb29e4f804e6e7bb15b0ba7927e68d68adc
SHA256cf5ebd18594651748583c3aa8653ea0135a4e13600ea7095d991071b3abfbb9b
SHA5123fd9f46dff6e74614e4cd352ae38c84907aa9d9623e077027bdc3c5d7e563129abf9ca107783b7dd73b8b11fa8ce915e2cfc80ebeb327bd4675464aa1a008191
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b