Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 09:02
Static task
static1
Behavioral task
behavioral1
Sample
c064b44c594d01d671dd9531ae7546df_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c064b44c594d01d671dd9531ae7546df_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c064b44c594d01d671dd9531ae7546df_JaffaCakes118.html
-
Size
160KB
-
MD5
c064b44c594d01d671dd9531ae7546df
-
SHA1
78e8ef51b2c6be77d71cdf775757fe2d8d44a142
-
SHA256
332ac4a454b792802b92f67d7fa98aa9ba7d5d8686e43fa262f2cdf51d9b0638
-
SHA512
f13f1e1daaab3d77f27cedac909a5ed8c6b38f81c4730f85515878ba452081670c76785a347e94d81c77f196e3c150e1ad05093993e7c60b564383fe39153c47
-
SSDEEP
3072:STl6eRXnWyfkMY+BES09JXAnyrZalI+YQ:STl6YXTsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000b517ad726197bedcbd022344e9683615d0f249389ec4058deeb8725fefdc697d000000000e80000000020000200000009bd269f3cc201616f582299f3f5ab3355ebacf1ca21f9923177da7187bbb6dbd20000000aac373f99264458aff69709568215f2cbcbbda436cb2dba348d94e70da6830fb400000006eb79c0fe80fbf7c7ba706c2cfb2882a7a2aee5a7b7ae99d7a66e5202dac22a888b17e3881febff61e35d9d6a0d8888ad6eb4edd1a17b544992db994a8469dd4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430738413" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BFCF27D1-62C0-11EF-8BEB-4E219E925542} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80175d97cdf6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2404 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2404 2252 iexplore.exe 30 PID 2252 wrote to memory of 2404 2252 iexplore.exe 30 PID 2252 wrote to memory of 2404 2252 iexplore.exe 30 PID 2252 wrote to memory of 2404 2252 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c064b44c594d01d671dd9531ae7546df_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cc929becb20863f406918265813f167
SHA1cfea9892c87c4051182a85c336eeca2d082562ca
SHA256fc5355be3b00c829906ec91fbb0f792e256ab00c5fb943a2f97f5c2a254d41c9
SHA512ac8e1b8fc48dc349a3e7dfa2333ba3698360a5912f9f1fc51d638b1fb85f7fad28f01f1d9ff5a507ef0dff400ce06b0dcb255b5e8340130e17439aaacebdb356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555cb39f082e2edeffe822ce5fe1fa0ba
SHA11beca78227d96a82d55680bf72b6908f7c4da603
SHA256376101ac439c9ad58172c9ca6be2f3b484b2ba85dbb72cea83be98dc45bc7f3e
SHA5126952786049241d3aaa72f3cbac2e735fd2ff910b3f340f3268f60207af65d4f5d1595460eff54cdd46f81301cfe809712ddf53a9b1569abd3110bc7a7c846cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545584b082c22e0c2caf2e8d53ce066ca
SHA1ca4c472a30cd958c2e1778f68bd2012973442758
SHA2562bf41c5d9d37e62a24e9c43cf607bba65d39821dec3423cb0fc8b1165505fd75
SHA512f8cd26c0763112b55a5949e44836ff6fa4351b9beebcb9dd18e6cbd34d4653b106b6bd8c74a44ca6661396b584a0772730767ddf61bef90e886dde1b1a600483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d535819d1a32c67749d1f8fb448226e
SHA1d2b667239bf1db1cf02bcec6eb98e03e4348060a
SHA256b84e819db779e5bccc1a225e87083aecc0ae49753b0a70d3223db41df71f3923
SHA5122e8412e960f7e8a0ccd5fab4ae11302d332a116775ee4e41ce66b86c0843ca72df6bab035d6c82775969e92963827027e860e70d9328c52517c017d46afeb696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573ddcea0fe60020e73f2e987e0900f8f
SHA174c72b18255e8c0309b9fe9271b550fa4374f5dc
SHA256ea7edea6ac813861ebdb92a98992a2e04a3c8a12a4dd8beab6fa0154c7e88e99
SHA512e39946a47760bdeb24b86f0823182f3766bb695183ce8fd2fdebfafd328584a7f42fdc1959e91c81884b998d8aab618142c23d6e79aa2c7bbfffad4176ac961d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504a5285c676fc4d3d1eac84a6180cec9
SHA1e10edb0094de4514107431c69d21b9ddaa944cb5
SHA2560d23422440d189f4407e56584ae4631bcf4cce378802c57c2dfacce0807f9d1d
SHA512986cdf645fee770fb7691e4cd7a775e55f5d6e024c6d613d41408a2cb68244600aad059e90c716fb30be945e9749c1c5225da3de3e4801cb2f8acb528a2b12b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e891783eb254752b9168e946db73c03
SHA138972859e4c2a8400e009767f7d99c584b213ac5
SHA2568cf774203965c927a80911f95511ce981c67a3258488f30572c5f53575ee4c2a
SHA512de835c7f68c128f266c85f3f707e2c6017b375a3ceac5058b1be043782727c5c149ee49461b8da6fa22e5f7e85848cd5870b112953d2523990b889f4b3b8385e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cab94e21f5272e3fcf15f9f088f1221
SHA18965e99799d6525a475632e53b72ab1b095dd2eb
SHA256a459fc2c97c0e4ede01ca804ce84301602446fbbc9a1edcab3c305e80d8f0eb4
SHA512f51e9b3c31f252381cad3a534919f96dd6fc78066d341adaec526911693457fdda3d27d98d1988cbc732ca72a47f6c9e14eaa46a6759a7dc8710a93dc2b1638a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1acfd3dbbb91fb772b09fbf93c8a712
SHA11e78ea2d4b3437edaafddbf1133c26a0ea4682c9
SHA25681d23e28a73bbe1c061dc1bc26157243a07653c5cab260fce3df688a1c24a51b
SHA512da363550317a82ecb19fe81b5f732342379a21cd3cb2384a9fa28adbc60f42f5bc72037c730853ec2567a3e0945b698bc9999fa01f260c0dfbcd0eaca3e9ba53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5075f7e4b723f742744a0920e797488db
SHA183289ac7d8df920a3daf303e83fb43086ae5ee42
SHA2563d141eec0e207d70a615279c8b8c933b8f333fbb35c66fcae7e149efe1e602e1
SHA5128ac200e906f0553e5245d621ad37c133adffe0eb3be8eed7dc131c6f1ac926011b195a9b3a87e0d370b83010b8d7e7a3b3376618dea88e2ecf464d412b796715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4bfca936ccdde4856b78d4561def818
SHA1a4869825b0eddea5a95256aafe97a1c68b36eb5d
SHA256bf0e502ec9cd4544718209f3805d3d8a75dfd16f6a53c6b11d8e3efd69c99039
SHA5122ea9d062f20d76dc06b70cc46efbd28a6e7460bb6a2b6392b820284ec9382f3f3555dd8bbee8e060bb87ecd384a421a85ce9f615fc8eecb8c7a728b1802987f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501a006c567234d244f9efc720b595d5b
SHA1722c446f7ba769e819edd03469f0fe548bec11f0
SHA2564d7972520870706e436486eb728f1fc1eed63be5b8647295d79679bb7922f8d6
SHA5124851c5c93bd3c365bdb0d34402c973f285cef3ed753fa5294b3e887bc7b90fc1616a4a148e45765ad6eb9409caa034ed9e9a0b8dd45fd2e4c7e502f8b7f741db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5ac12995182c21f08345a43fc98ca33
SHA125008eee7582e8fae6ee0bbeb2b748e74da88abb
SHA25674802851816dc143cfd0bad809063133859923498ae5f1451834b4dfdd5fed5c
SHA5128aea453a18aaf017346fc3d2cf3d77641c1e8885b179e07f4d2b0f35190a4448c30303448a585c8ac520de453e12aac3c1ce240b2a23c622773cde0be04450ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e74ca5246634248c5cd3612b68639f6a
SHA12781cf253324147c50518ed8ff7c87dad442e431
SHA25670bedc0b8ac660ee87daa14f91c0f561441f2c8c662e066ae042a617b37ae886
SHA51201721f149c1862c6bd471d13da5d0fbcf4228a5b169b2913f0984027b9d86b231b6e5db686a10fe22c5d3089acbf021d8465832c1d57333a8472260095cf4dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da22483c674b9362b0c7c555500d973
SHA11711fc79ad53d65b17ad1cc321d5acf9fa114985
SHA2560bee3ee8d280f3ec054bd9f753cd33ab32406b433541328f2136324838d49309
SHA5124c326cb4c67fdebd01261f8e84af9f993a2017f132df3e7f7b56239b8ffdac3d36fee2e64fa949b621f976b4f0e7876d400b06169ba58ce64d5b5ff57dfda1ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580eb7f0889d3979085dc49b3efa95c37
SHA15f21f183b72837dee8db5ba3d315fc4482045fc8
SHA256f7c9c9b420081598f8ec32191d501926bb80ba468ed776d7a455eb3c692b2964
SHA512bfbd5bf687d1e62307eb36488140879693c907711c92437a2a9ad8fac97567a25f1bd02824e3deb2100d4144e32e58499778df23e2d441be489886f9baa81369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db9993896ddcb631b60c4aa3738ac0d1
SHA15b9bb789bdbacea044716aa905e9d3a1d697b4ed
SHA25649e23ba805e6fa8d95416e84b8f6c7452507c292747e930108e23fc910fbafb8
SHA512c768ad9581201bd85488719dfcd89b25bb1c72a2a605bee7a36fc1b9791554e64c6bb3e0259839dbba41e99df69629d724f0ade181938c7b9f97a96dab76fa68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c741c47afd7b416e3e222b2a01ddd4e
SHA13cb89a62cb1146f88a1961aedc7a85b8e0a1f6ed
SHA25605c12f452fd605f5c0ab8ba261f5a30819653ac571df40e2a23a736ccc882957
SHA512c1bd350fb66af57b472e84a6f33520aca0b178544a2271bb513be1d830befc0c6749234f2a74f9f422cdaeed7ba2f47b939bcc3f8723b1a8cd984389ee7380b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5982d431d847be4f27c709ebd10c0a508
SHA1ff24f8e3f447cdbe0061bb43af84cec80361b676
SHA25608a82e46a4e03b5582e64b4cec8b1c888d5b4cb26be02439ce08f9dce5dad80e
SHA512a92a3762926fae25c0e6028c46b40f25b85d7dc9e76422e1e9df737052363c41ac034d6932680e898ad06abf12eb2e4b8d642dd60fbdf848f8b3be45117891e6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b