Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 00:03
Static task
static1
Behavioral task
behavioral1
Sample
cdd8480f356c254430aff1d0746cb15a_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cdd8480f356c254430aff1d0746cb15a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cdd8480f356c254430aff1d0746cb15a_JaffaCakes118.html
-
Size
25KB
-
MD5
cdd8480f356c254430aff1d0746cb15a
-
SHA1
4f576caf6a7e3d3a74079bc267023c1b52f80c77
-
SHA256
1e19742034c40e52555abd4b1385fab68bfb18adb88c3752bcdef782a0d07b14
-
SHA512
d23859b0b87741921f6a28d8f904ac08fadf65b6205ddff055e6bff8ac73f94a85b8bb0def011d539f331e3c6a8a52714c7b9cb2957558603e9bd4b5e6f91214
-
SSDEEP
192:DBzQevR6LknzLUqZA55JcJrozwJabyTY1Xo2Rh:CevR6YzSI4wJOyTY1Xo2Rh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B69A071-67F5-11EF-A850-F62146527E3B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431310872" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000009fe7a87623566aa30d3950133418d8a9c60ee199f3bd2a6e269363db0523e93b000000000e8000000002000020000000af1904d028c58514b72cfe568d7e447c3fce19a98423bebbfeebd77dab54ebc020000000cc4ff5ea9233a13487254868141d02408ed737d361fa38f45432e1e52c7b7e2d40000000727ee64b6896d29cac7275f90398b46cb191d529de7e35e6041ca18812a25ec4294f58ae4c762d3024f956c871c0b896a4d12f99b0bfe905c49657baebd09ba1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0640b7002fcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1820 iexplore.exe 1820 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2264 1820 iexplore.exe 29 PID 1820 wrote to memory of 2264 1820 iexplore.exe 29 PID 1820 wrote to memory of 2264 1820 iexplore.exe 29 PID 1820 wrote to memory of 2264 1820 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cdd8480f356c254430aff1d0746cb15a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585f1c744997df15a585f3708f41e7324
SHA153558538a05ebb3e93fff9b023aa8687f4d9d832
SHA2567010c7bebad4d682d3bd6875167214c9cbcb0ae04f804865f742778572e256ed
SHA512c13dc0c01d8e26b783c50ce7b4267a3523be50926c81eb223165c018b73284b00fe8a27e79d9b30d74a9b680378f3c1f2f47bfe192d7d05e0592d3747ed50572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cde5503f654c05a9745ac07ceed65bd
SHA16e1777933434372321316c66a405eebd771de511
SHA256816f0cb0be58397ed87742a38cb9a18211e85ffd74511fc50a8e2d43d411a51f
SHA512075fb2ce53951c0e0b746537c853dba55483ac026b7c78f3f4d9a9f06e88ff2e91c93d63aff5e2fdd21c2f78f2c4ae234cb391e4d1227be2244f9e50394f4eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590c8f620ae807db4a096a1c9a6ea7d15
SHA1707a7ba8af2716e04c077c988a5661018d5aa1c5
SHA256e7fa8a8218a10d84b00d88d161d0cb259b86435988ff81b38b0ef1be89e4e28c
SHA5127712a0be3798e136d1f2cda67bebecfc6d2abf1a667a1e188aa556130a3e26cb68b94e2e4b1e49fbead8710435de9e15b1dea18343013e235537c09ec8ad3f40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deb75d700bc28efed16e1ddc5bf45dce
SHA1bb51e031afa0fa42c695a9266203625a78f22b73
SHA2560d9cd834c64e7c985beff3160c207ae959c72852ed70931ce72cf24c18a93eda
SHA512e0c3b2b11e2e3734f56bb0a38dade9c8e74848ea9aec8d21ecc482b4dac511414742f6743fc86cecf509ae39b475589e034b460b1c14ed50b6a3ccf1cd660723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eac3ab2373965eec01fd8aeca6876210
SHA171baf350128cddae1803a0378dadbb9c12894f7b
SHA2564493b30cd1483316cfe71c1eeff5176cbcaa55198a3ec291e93b255d85318a8d
SHA512ab90b52b3c6be196493a950bc12d06d686df66658954269139ece8f93d063148a7ca137a7c4f82a15aa9114707d0737b3b4a4fb1997a84753883dc7a9581daf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c1b295b3146b5db57f5253d0aebca8f
SHA1ebe35e8f555a028a9cf0d194685ff4326ced58bc
SHA2569c5da5bfda754144dbdb961d9d67295443dd95a1536efa767e6d401d596cbf35
SHA5127adcb4f4f3841cbb639a5067fd55d4c7d8fc784b27745df3eb3cc0eefc148d1b3838bc5118e6140bd5d9858c25e053704cb31832bc6e6ee62b3867a3714028ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ec0fd459d733b01d5a0120bc23a69bd
SHA1cada93a4e261629e15fc0965109861daf34116fb
SHA256436ba94a78f7f61bb67c256376de24656e962d929b6744f761caee732829ebd9
SHA512a4bdcee7ff730d232a746df04b8d82472f38cdf8f5cca195a5293139cf47d36a10c9233114dc0232c05517fb4ed855db6d946a732024bfbfaf318a1bd0fe71a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbcb959e5e135b56c16ed7e0651924c4
SHA1a265951f835d382f2fb4ff8f3e852d71786129df
SHA256cfda7b6e467d126768f524cfb7d3e72050aafae6bb23798ce394625ea2c8eadf
SHA512f8585576ea0bd79d60fafe1dba36b9b0b7e7a2101d4c68f854c1e1b20e172d8e39ae09c42d0d66d1423b5c0d7d71f0ff76325d043848c24fc2456eecb0e7e05a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5373ce09bdd38e1e7ea777834ed322e03
SHA18dd33e7dfe96acdd98206a309e159e28965d18bb
SHA25683057e20e0a071db33ad7fd09593b8f4739b4b66b0bb7fdab0897c06d8eb6d04
SHA5120185bdeb85e86fb2e092f66426d43f28ef048f58deec5fd6b980458d29f9eaa9465d25c46b2e9d42773c88104af47e70efbdc6588c8735c9e37be36dc5ee898a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531e9fd0dff1fd8a02ea5271a364bc516
SHA16d197a71f6f509710ee30d11a156bf379bbe47c4
SHA256aee300b5f0873aee63bc7ce6e276646c84dfdfe18df5715be47f73a245d93fe1
SHA5128ad9f645ab7c9fb82b7d01172c15ae5ae8c63e06782bd28fec5c506219adc8422956f53e4fe5983957992083daa20d4c96823bca0c2d0f6d016a658c5180aadb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525714890161427d25e1a21d5bb10fa71
SHA15c3ffc0319092e714bc02f571c5741f280e3bcf7
SHA2569b9955a30e1c78a6b1fe0c08c9122815c2ed4592b9ee6a361d9be050a0c35fb6
SHA512ff6ffc9da3259dc14cbd51c47437fbccc22dd1e946ebb273f84628cba7b2cd2bc65df9e581756338ea3ff7f9f234ee49bbbbc28c9e2a32e08f9a99beeee4a1a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d8b2738b4c4c051215898625f3933d2
SHA1787735df59e616bf268c4b547427b2d308928e97
SHA256f044d11561a5a445f408c7b5c011698b685ca48ba1a0a16d9e5d85b95c0495be
SHA51217adce7d4092a7418c90b7547a50ce0338865880161164ec52cbbfc7f1738174683ace984a670cfa27e72c466d5d5f9e74111e2bf209a5b6fbaa1b2d827b91f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8367ba5fa0e7c9fcf41cdf866266b62
SHA1a4838cedb9a1f70364f09ce437263d7e4bc0b9bd
SHA2560dee6d5cfacdcf552bb35fb7dd5c992deebcfa07eb5966047e05295819e9f229
SHA512954a3bc90ffa4f61d8384b64f0f1933bc96556835280c69ad81880cd076dafa831cf813d5b87d09ab68619c100ff133d6bd145c1b1a66fe4f64bd1bf712e19ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59087f05e8ffdb13eacfa76661d04e1ca
SHA10524e93e22a86d89b0bfb2ecd1a7b1a5bd50c79a
SHA256dc9065fbfb43d181f915c3a9bd385926cd42f2940438ee43a17a047af9b640eb
SHA51219c6ab3361fc446b3e6de822f2cf6ad50e64d01760c57258d41b5cdcea9630b3697acaf270dc9cf18ef2e9c681514678f4d83810b8179429f868dc1005e54c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eef1a830ffaa15199e03d24113e9d84
SHA1b908b3d5d27904a78a6ef61ea9c67ed30784f8a4
SHA2563513b83e96df36f57abba2832d084cf4467fe97afa1d6055cd2f8e3aa896ff8b
SHA512fc91c2109fbc0b0a6fcdec19f637e6826b0986c8028aaeae9fefc75c7c414c9e1636c0a0f7826067c14e08061590c9d54a9f48ed665097610b7a142d13eb1ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55682e7e6bbcdca015531cbe7057cd45f
SHA173403ba23a24c4081c4b77a39398f6a7231b5b58
SHA2562b77f998dbf58862a19cd70b7ef65fa50ea771f5d504e593f9a6326c23a8e493
SHA51265a2f561c997294ff8fc76fe345da2780f892478ea0163fb349f771769eb2f47dcf00a810d57ef466473de6b04e697e756ce2ca71bb8d959d25039a45f890e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590ee987ff2106cbff6a59a758c40625f
SHA13f2307b03cd128969f745c34881892d7f685e343
SHA256794a8616e40106e98e936a9ac651b861400598a6604c12cfec5ff1e1a6da54ed
SHA512c31b5cadb93863c630084caa367a03355df87c44f0098d7e7c05291311e53f80decaf44934cd53db45974df67683ab352be686ec035379612ca019e850683b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a84148fb03c7506bdf123845b31de9f
SHA1aa2a0b718f3a97899493d9a527441348ceaf51ec
SHA2564b94a17fcb29274ec056279d56839adba69ce7835a28cadc041ff8bac5093f71
SHA512c7f52b5c43c88e7130580dee409cc19572031a7528b96c1f422b7225cda8832025d336bf16682f316de66892143e159bb092cef6f85d356d802b448261e6008b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9fbb398307cb8085f89f517d436d95c
SHA1e6953bcf0c0aac9073164fd227b3be2cb410de31
SHA2561dd92ade730dd9b631b537de678b8f17bcd165a80579c7ea73f60116f1e5791f
SHA51255a0691b3eb3d31c4443eb05cce6bd61af3b9d98c2caf70abbae309d1b5efa04aaef3a31d0b6e3d26d35ea06806a1f3dd76daf9598c400c096cd58814c71f45c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b