Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 15:08
Static task
static1
Behavioral task
behavioral1
Sample
42cb15e70e2cf7f24979e5c03beded34_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42cb15e70e2cf7f24979e5c03beded34_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
42cb15e70e2cf7f24979e5c03beded34_JaffaCakes118.html
-
Size
25KB
-
MD5
42cb15e70e2cf7f24979e5c03beded34
-
SHA1
b6ae745d943ad6bbfb345e7a06613db87430ad40
-
SHA256
daa7794213a8f37b8e170eedbf05722ae6e9b64c79f52212315cc7a7b325475c
-
SHA512
daf2301661b37df84ff3a1cf035e6fe18d5a05743ee64b3a3804b14ed58a2664e97b70da9ee5ddca4262e4eb0e49005312081207ab5642dd56a56d11dfd46f19
-
SSDEEP
768:+cQA3bRqL295pl4S+BaG0V9XrjUd0BBknn:+zgq2b+Ie2E
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000002b97f48b44741f9fbed40e2ca6615eec9d4f35bba26b679ff6d58a225af3a93b000000000e80000000020000200000004f7b2ae7a7a4061e287cd0a880d4942cfe9eb48fb4939e20cf8120c35321b13c900000005629c0069aaf34b0e1bb260c294e54b3c42f90f5f1f1c10c64655412952b45c64f28e7e6ff6785c412ff3aa82ce8ce39b2ac07a500dfa76842cc7e8da58e1dcb0f6b778b7809c495964eabf2c019896c8a076bbd4c7b6f20489b43c6a28628226e4eb348aed37088f74ba22c2e823e7af9b0f859d61a22731d5a82fc38469ea3ef0cde57f8ea3dca2b65a631b76f49124000000025005e2d63b4bef7c7cc33e63bc4447d9dbbd068cc848e6954bb264fd3079869395a755c6b508662bd9717906832e026fbd3207e42e87f3d54d7e2c101ee87ca iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435080375" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000f2929ea3319339b2f3b612e71d79d35dfadfac5e56ff72c76c338d7750330c6b000000000e80000000020000200000001de2e32079739c6fa1cf619783b2b6e83157b0363793b5a46bde35439af05dea200000004952db4d0c93a26dc92addb6d2fe3318a4fba1d3c640d644d314af2a1c3b2a3a400000007315bfb86d714cc9140c6a3958ceeef6775318ce4f5c841bba0172eb67688109d7ee2a581c3f94386ac58ea9aed4b0f69011de91c7d70ab8dbf8b439a64e9aa5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00ae36024b1edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2AD154F1-8A3E-11EF-9A8E-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2748 2212 iexplore.exe 30 PID 2212 wrote to memory of 2748 2212 iexplore.exe 30 PID 2212 wrote to memory of 2748 2212 iexplore.exe 30 PID 2212 wrote to memory of 2748 2212 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42cb15e70e2cf7f24979e5c03beded34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f4d580ed0ed96d9af71a83dce9df4e3
SHA1961836fdec88fdf9ff2d453ab31c6fa4475c4691
SHA256335b0b992c021a1cebd873f94e67bf30fcb1d2d87ec2c7028578d02caba92310
SHA51255d6e6e0b940b2c5b60e9c4eb09cc743d696d8cbc2965507db3bcd6da0d3485daa6374a789a9e4079eaa9741eb01d4e747293f59ac597b09b24e9343d0161d57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4b365c66ab0e6039600de315227d2e9
SHA1ad6194ad5ad82ae8c58a9e5099c1c62eb3053f44
SHA256ed429de01f2e0575a0f6802c6d0fea6b2d1025edd4903046630afb2f9929749e
SHA5122d6c2a76af1f58f53c3520d5dd64c436b63ced935ef7d623be179dc5cf60ed3527bb13e37fa6043ccd056aac389a734cc40ef58dac0851f635f4b64ec258041c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569e99e9d32946a0779805a19ff9cf5c4
SHA111e0171b7e3cca5f45bba9556808b1baeaeb0a5e
SHA25657f8a02d952692bb8c5c22dba3111b5fd1d2e919f16cfd35057bfad40f1d62ae
SHA512e470fe8e4eaac73adf074d186d901ff9d20b19452411bf6b349219398b3ded430d3eefe0646bfb9db75d3731f385e5460471a2735380296bfc6a839d4c2838f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3824e2737bacd0f7bd3d91af070e819
SHA1e703f2359a458e9329e94827bd697b5120d53f33
SHA2563c2654c07a02dd19772823034614291b505a57fd4dd96ec164029f5cf2b07e29
SHA5123390bf4a8ff156379cb61d4bd73c9348532f30f672fbbd6c15c75270f01ca267755f1c2fea6d9f4fc9c994c5e706ba97d4d7ba4fceebc3b549324886797fd17c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8adcbd6d156b2530c6d1a65043ee661
SHA151914edf82af9f7376439b209b1556fe9e82a2cb
SHA25688f23f348b6574c2817d6680077546fa08fc6a05d50ef97386b97f732dfd3832
SHA512cd06e11a48f048eff791b4ec374ff5f4e2a3e35d75af11d016393a6f484fce6a7cf7959748459a831bed387283137918b354f3d325d7e013d71509fcbd0fa3d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbb1f75eb77fe20d4ecd7df5d079ec2a
SHA17157cb4e60205666bff7b7a03cc825e4e7be2265
SHA256c44656824e6e73fda6aa5af65dfb4e6b015435c8f27a698932cd86744ceb2796
SHA512202a8cf5402964bac957fa70d5e088e622674d5a771b8286324d0bcf9b9c6c05f46d796d2a6653df7861dcec06a662e419cff90636a93031bc0505ef121dc2d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bf0173e69a74fab3ad22ed4c83fcc90
SHA16ef5b64601cda07230fe7a84fbb8bac0516c86be
SHA2563ab73ebfab7b5a73370725759b27904ff918989f5fb8d00bc000914f329eb698
SHA512f08eb7f6f229af3c0848520f736fca53779cacc56bec1d6acdd2e6ed986885f1ef3460412a418d06e8f48e93b23787521c69eed402d62a1cca87a98691fc7b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd59d4efddfaf1c89dedf49860e32af0
SHA1eccb9c295054d91b97d00413e25911cf3052ec4b
SHA2565e5d2a4352e505d3ebe41144662197492bab60c3aaf8352a19b723da6b3b3200
SHA5122cddc2ea5b06d80282f951a2a04a8648cb75e4a8bc1e22a68e37485c32d72882fae8d70e30329099cb83f2a3ed66022c6040f6e9a845df57d6735f5059c0c5a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534b3d7376e8088baa240de941b3e37bb
SHA1e79a81cc8dfa7cdd4cbdda08ada794d276fb7ccb
SHA256fa0012b963836717ac4bacec57bdced0b35f9e5a53a78d3758ec2a181f914f46
SHA51200a305510ff30cbb650ed8b9a40e4a474b2a8a826456d5e589770f34a9badbd4fbb3b34d955454400f41be10458419eb0d494899327c7cf5b128c5434d72c1b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5069f88b4dd47dd84a742d1da4141dbda
SHA1a27715ed59e2c36535790bcb1b34f1a15b3c93db
SHA256045ae4b1e59158a78ee4dccd9054541017523ecd1239249e605ba45fa72d7c53
SHA5120f30f132d61febf0e20c27e5e946c7bc389c9c853fec07d4ef0f845ab76d38a29d2d733a5c8d8f4f86c5d48de54026d94fcb105128056831eb4b3a38639279d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e27227c88dd2600b1c6077364ff6c6be
SHA14222a8c5be1dc9479ba626f3d6d5a8afdd9c99ea
SHA2563f1703cd3e4338771a18d30197fcb495233e33d7769cfd6666a463b0fc66f8a3
SHA512870c0da608cfbfe6dbf0d52fd9adf422bb86a3b34ac229ac3bec7c11b048295d9dc6736c6fc7a7d85d33dbf6e2355093acfca76eb00966185b7c2a818578eddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f462747534a4ef206c7f078fc0088d8c
SHA13952379de283d1b90dea5a97a38011754a36ffa2
SHA2563c8b05be2fdb973bdf079252f211370533023d9b6126df5a0ba127908411a936
SHA512c1354aa62f943659548af232da48b95b3bcf6132e9970adeffe3ac26c057878b33814d3483bae2e1e7557c7c3d03260eeda369b699be3cee0d7a4b2ddd77ed8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572561e24a6121f6a277aa58ddbc611d5
SHA1a7567e9d96745657644511f1991f6c1d604abe7a
SHA256a14c8a006c9272058f5b0038654cd4286b40adb374eb98bd8158f85f3593358e
SHA512c5e62849cb42ab45a260cfe813f94087044dddf85c1478b7d3791627a7ee0ff5627b60f0c579caa01b46baec28d2ad2936c2efb459cba75a1389b5af12526a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570660110845ca38e672d605b2b2ddd86
SHA1fc68b7bbdd2103345ff1f679296b6353dfc25ae8
SHA256bf9376cfb32a00ec36539592266f1f25d24758e9c220925cf40e192967d6db47
SHA512a88099d0eeb8e719e4568526bd59de8a77a8f2ea4d3cb1e557bfeefecc4cf2dd1027dc0e8ffb1081eb58f1448a9ac2df6e02e98ad1d43d00e43fc7bfadfd923d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad8706f4b9ce884e0fa20802cd6a96f
SHA11b58fec5e4e738129f0c1d87f8b64355fc248511
SHA256a938fdb7c5d6f0b1f22ba3dac922f8d9e247596c2f21b4dc4782251cc7b3533e
SHA5129516f508c6a736cfabaefc267e6fb65fe3753e0e6b1c8b4c26a50dcbf8d63a75fc65f3c5d10c054f875cf8da6efe95c0489e62ac3aafc4d1428358a3ff0681ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d500e5db621ad5139459c6fbd5e5414
SHA1139266ba2856528154ff69ac7fef4f07eff21272
SHA2563748bc71b1e492091a7ccd7a33549d4604603c203755197da63dd0de2fac605d
SHA51281c2856d0fd0edc9b12361c7d25e58ae2fac40a8feafa47e5ee16d0a7b0b2876eb66830a4e156dd3a1ebd2198bed7947439a066e06f3e736d714a46382e97907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6fefb9c58390388c0f782f3cce66398
SHA1c3bb8d3b33fd9913073c42c78165d7b1d794080c
SHA25634395c9e9305b05108545c95121ca1a889a44acfb1ba4b163b41b9b646e97fe5
SHA512add734da432e60a9be63f5b6a1403ad93bd3a71e31f0b222854f61f9e1770efa295fb2322ecaee3d8f072c41ff0f592ea273362b34cba70dbd92e4a80397d93e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551e1c66a554705eef24aa2b0e9d13b2b
SHA1691fb7773cedee4cec5188d7bb3a9e1c1463618c
SHA256551d144fb7b48e6523fa58ae7fbf1bd56f1e85d6942c17d493934aa6cec04212
SHA512bedb37945b318853385d1726f8b8d7e853be483c85b63887e058b993b19787aa090686bb6d4aec39a81089ee9bdfad55a8dd5a6ba5f1a3b0c97ee67f2d0c6714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2022805db47c6eb027329161236a705
SHA1ffed986c6e91ff8c84060fb1a8ccd6f1690740c5
SHA256c1f65ef2aa6be610c28ef2c70ad6f037161276085c9ce177ff61f1309e20929c
SHA5127cfe2665852fdf830c527121dbb319ef3e617695898aa3a9afb17a630665f39f4a0828c4e66c7a7c90d6f6495b4883b296d2f12b5693f0a6e7dd3976f87a02c7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b