Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
4187c5f714fd23aad42e53ebeee5e545_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4187c5f714fd23aad42e53ebeee5e545_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4187c5f714fd23aad42e53ebeee5e545_JaffaCakes118.html
-
Size
26KB
-
MD5
4187c5f714fd23aad42e53ebeee5e545
-
SHA1
f581e71dc23ffe2b481e8db7d26e92aba36c7e18
-
SHA256
db6503825f767737c19cc6aa04a4c268ed31dc55e15030ace8bd9aaa667c3b7d
-
SHA512
ffb66e714ff4d35697dc27b49c67a830bf9c0344a242ed2049338d1f0edbc1a31f308d7b99741769c9db4ada1b60a8eee723d93d11b751ebbc162103e6c22bae
-
SSDEEP
192:uqyP+pKGW8bb5naGnQjxn5Q/hnQieMNnGnQOkEntbLnQTbnRnQOCJVevo7NtjFor:nEQ/1ygc4mur
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{63755121-8995-11EF-B2D5-C6DA928D33CD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0881638a21ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000450466bd4cce3fa258a726fe0d7063b2552c6938d57cc369afa61f94281b75d1000000000e8000000002000020000000104b648958f8d61d20d6e620e523ded30181a75e71dfff995c48ff1d451d899b200000000221031e8b65e9136b2cf7325ffa9d7daa161b32b2f77550ac72880cc66e5e6e40000000089cce2c11acda34dedaca37e1669e36689268bd68ba992a0b8b99122cd598f4ac91cf823b3ebd8d9ccbad765c944b80f6d3fe16ca6f8967fd326d1c1c688a21 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435007885" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2676 2696 iexplore.exe 30 PID 2696 wrote to memory of 2676 2696 iexplore.exe 30 PID 2696 wrote to memory of 2676 2696 iexplore.exe 30 PID 2696 wrote to memory of 2676 2696 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4187c5f714fd23aad42e53ebeee5e545_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585a2da3dbb5dbfc92ce35f0b490153ac
SHA16d81c8b5f20fe6e612e16ad623539b0f9770672c
SHA25665dd29b6871aaf856a7418a08e9c99a7f99ba9b40e93f1a5d691633d7846cee5
SHA512cfe1645560395b0ebf8b51fb56b6dc83d4c53eb322269648ac477edb6ba2dfb8af77c168f2545f7ea8f87ba0b0f6e059f8a0f51b89811390caf3a485594dd5b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56df17fdce18f3cab462af74649e9a623
SHA171faf375b21f19137133148c099cdf01245fcce6
SHA2567fe21b4639d9158c5b42aa501d06605ba3fd0f39e3270c7623b16bfca964064f
SHA5121b6e0d8586883e90d661f24e4df8a9fc97370d948e82270a3f41caa5c36c7ce727190c8f0b73f6f22fa7a452bb78549265e64f17ecd45af4fb7aa733760ee39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f70be20d2d6a7e89d651c486309215ad
SHA1f675f0a0e141f96027e39e9284f4b964b017a9fa
SHA256cb850653b6d522cc23f44a2ce92e70080c80ba23ceddd607455fede2980f59bd
SHA512924b7f605173686bc6647f9d16e61f25d3c7aa5e7426ff641b1db7bf67dbf2f2f720c556ec60e95b5ae5a5532857499a9e179b0a6d00b0221898e7b2bebded4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585fe2822869615393125356ef79a951e
SHA19928af98d51b5a4f35d1f63871fc017de602ef60
SHA2562cf86920a06becce7615877b17ac50ddb5a274dbbaef98a4899a6b2c7c7d2335
SHA512239c8210f9569c0a5c69eefe8d6eb0c08bc111e8c81092b67f6b32cb79bfe8453db4f40818a760f41c867dc887adb4f699faeb0f7d7b10dd5d9f0ff0f872002c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c84577be1c66cf035328fd28de90cb91
SHA107a4ce5eecadc74841691bd46345eaed82a02778
SHA256bfbef765a73194241c8d7a649315c08238e4583a8b078007eb6f22204ff718ad
SHA5129d1c7d88aba2e1601317258694381548468266f85aa52cc923a19a210143c06f796c50415c160e8a994e7366013319d2f976c631ca8e923db63d1bb9940e2e05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512cc0a905b1b6f1f79fb798f3681b9b8
SHA1e2cb23570306da342a4ab89bb820c22baeceabc2
SHA25654943f7a8d27b6a932b859323cfb47e7221845ebdc13b4a36bb8260f25315150
SHA51223fa2ca01e50a4dda08876b0139678a28aed4adfb1861d14dd5b14565889901351495466783ef3614383a960d323adacf46d51a641edffd21b92051815956ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec3974c5f5bd68c199ede20604225b32
SHA140f02516aff00305da36e474f451ea5cf235ab89
SHA2567b42bae7cb21f3ef3a223c4f3e58225912d72ac55b2f5ceff7e2d916bbc13194
SHA512b6739bfa275cdbe28dfb16091aedf7e3f77bc78085f7dc16ed52ac1e7efdb8c5839b4a02d428f24c2e8385293bff1bffa29b3df712904d2e139002647f1d63ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584b6aafd117a091c3b9c12b53f80b3b6
SHA1c8925f5186a9e9f338ed8b5041fcac8bd47106ff
SHA256999d1db019c32e949238002e42b355cf251a7308d55e0af87778033ab9c4aa11
SHA5128140706f5481acbc44097e9329f611c8e8b27add1e4b4f0772923a96d8ac7f29ee49489e3bbc84ede48d2afffcb674e6b49e6948cf8f7598929437f1680cc7ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e3aac0c1a290375c2e2b53375cff760
SHA122f6fc93db1c3afc34aa5b3a2228272215d34785
SHA256f61403b32f82336dddd198acaed1dd5520e55bb0be24efb1c352f661116449d4
SHA5129cbfc0271fd6a3e21d2263b65ac449ad36a6105fa20de9db077b2e1ea45cb2a5c00d8fe4ac643d06a44cc3637ab6a56ef351249d7f52c64e76802c547bc9c239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff0632982c3d438b7dc4787b7f43375e
SHA1962c4515c182ad26779f5739472418f0587470ae
SHA25633ea1f9584c4c2e547d2b4e381376bda516e874a4d73f525d6d250a8fcb81f2a
SHA5121f56e9e14955a7cb0581a88f14196618f777b0f44525935fa9be8ed5b13ac65b72841cf79225cd88b7952fb4b17c0a98cdd2e230ed7918b11f37fcef72abb351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5426a0d95929b9c332b691e35ff49d60c
SHA194e807f272e341e41c8eab4dea7a5ed935d51141
SHA25661f6421259ef43c7a16662615cfd5bbc399e842bf7705161778a2e76bf78bb8d
SHA512178873d5e9c8423888c81d3ff14ad5b6141d33418754a5a3e527680bda50cb35563c53afff123b56200269846f2d18124a431131651ff5603e30e428b6125d3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7e0909ece9cfaf1c23d1734cc6d92ad
SHA17b6b66cf1b2014f00aa3fa9405852bae9924bd7f
SHA25657497ccda9bdf0a39de65b7e3fe11a681aa7c375d7014ac053370b44df45de97
SHA51242b5573f40c0de8132b63bfa71abfb294d037fecf59d0690f7d9c80074053f392c0696aa201e6d06b144818bc97ebb6c4504a2d04d8a8105b36195e9fae457fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5107be35cea40ba0f87ee5c0c6aeaaf
SHA11bc2f0cd4b88c40fbb236996b48b654c9c128b40
SHA2562a6167f846f2bde14a1f2c700d8d77ff4ded85aa7b6c6b566f4ef6c0dc763801
SHA5120282806970e4f2ec6a7ad77e3bed05ffa9772361f46f0e38fac8d4cdd5d4240721d4e325c3729b9e8f6e5a760adf77781b13182d0d27341ff51f240fb3f764a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bfebb253709ed40d5d985df1330c174
SHA127660823079f3c8d08e50f305939e6dce0d2f934
SHA2562d096a021bed52e0f4177ae86b680af8788ba8e8298d0d0f0fb00a0ccbe061bc
SHA51297dcb7b465e96886375e3eb3c4cc5748ef745044c92153fb7396dbbb30743db2a0442360013e0e04630b2f7528f03315b1b7753f6f74ae7b681c02d867d17634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adbed5fb91dad7e9eb19253734ceaf9e
SHA1b16220849075b7147ad91a8600ebcf4c12d21973
SHA256a73273e55885fcb415d3796e815f947f0f0012ec7d46e323eb7c363dd5181e9f
SHA5128653cb635b017bef274961900c14ab5ec2398ba3855372b65c18655b0301df1049371edc8fe1d3fd2f5c997e188cbd18863bb395a38e2d750c8999f7814ae319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58af8561381019ba1b169a17e39b5d62f
SHA16b1270c33b160979e2b2cab227205aa0ea679486
SHA256ab1bad803eeb4e38d60baaccbc3b3e5a8191d35f034634861d4875722f508e5b
SHA5129978fe3669c68ae70f23319550c3203da31613ac8f0ccfa75c40e8b766a20bf85a01f738834c6bcac7237dc2a932599321b86578f92b76e2577998021f65b640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddb470ccad15159fd97a927624f49eb3
SHA1c3e0e2552243e87f7313d1e8d5d913e0dcdb23da
SHA2560e003732e86040d613b662e8e104d72ad93bb82c9baf349ff4ac34e2e63dc963
SHA512abc8c57a4bef0fd3665e9b869d05019b9ecb6cf48a336adfb035b3e4f56a3482f396153e59d7948e3de247fda860c6f121aa55a995acc5c988aff605626e6178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e370f6c443bfc10fdff6670e3a6e1cb9
SHA14282efa618ee0b994c37133d1edf9d4bc041de72
SHA2562b9c3fc565a2f53906721937841bb037e0d81fd9b653f697bea909effacc70e3
SHA512307c2c9d291b7376e40a57dc256fe6390cf2f89ff3a2ea430273caee63cbe638636480aff7ff2ffd3c8c9e0dd78318db93cbc43b9304775c494be929461620fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5663006351ab9054c23a7ba51a678266f
SHA124bb4b246eaf98239c9917022c0772a5b48a700b
SHA256896756a221b9cbf73ab6d8037108909dfa2c9a1d09a086c77969e5e26c84c00d
SHA51216cb592afdf30f34f293cc1a09e950da4c9301d1a12ec708f5e81af50ce4a3d12b7a0297299bfad262ad3887e61f7ce7117d2e34297af2cb31f87026bef637ce
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b