Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 06:00
Static task
static1
Behavioral task
behavioral1
Sample
d9befb7a7632b1b8b0aa0728ca67230b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9befb7a7632b1b8b0aa0728ca67230b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9befb7a7632b1b8b0aa0728ca67230b_JaffaCakes118.html
-
Size
349KB
-
MD5
d9befb7a7632b1b8b0aa0728ca67230b
-
SHA1
60a01419ca6bedaec3b1cadb832d413c48fcd391
-
SHA256
de2bbcd4011aeeb89cf5fa8cb3a2df2f7fb918e2c3cc0c8fa6ae53a071ac7f3c
-
SHA512
bb22b7b019d7a77bc49d6b93e86b73b312f0210a243ff4c0ae0853c2d6ae55ffd22c904924be607a3d73d1f7460ab50a1ee716c44c642f50463c035870080013
-
SSDEEP
6144:ZsMYod+X3oI+YkosMYod+X3oI+YosMYod+X3oI+YQ:l5d+X3a25d+X3s5d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35E639A1-7003-11EF-8C8D-7E918DD97D05} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000732c21846204c2d772f2b6be5944e7e5d6521d60342910952bceebc793460b0e000000000e8000000002000020000000ac3445c88877fc1e1edd82915a82d0a9999df91137cb1a3f0e00b8685a1a3c41200000006d6b04ca883afbbb5a323941021fdaef2f48d419bd897b9e65d3070a0118179940000000164ffc993a5c14df112a54972170ea40be778849eb77d4918d38a5995bd92164ac47cdae5bb899de4a7f6986640c12c8c2f3159c37319141019048c6bb139ec7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0814c0c1004db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432196323" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000fcae5f6b4d6548e48c5c7512323d9351e859e211992a9bd37f6f6ec30cebb046000000000e8000000002000020000000966ab0df73832b0e177e6dd2c435c34242722674f200274dc8d826ed186975c9900000008be8b81d8bcbba85d4bb604aae677890954ad1fc537de66a703916c09f6d68e5d350a64fd86ec4a014f9cbe1d61f1572097e8eedded3671bc5a021668add49289af9496e0c5c51ae80f0db6532eedd42bb17eac80a1edd8ae960c57eb6d63eb15f2043b7ac43b9172eea89de6be14dc3e64dee228277aec3adc81b5d2a77e86858514369a295708bc2d7be1642518a0e400000006e1e5680c45ddd512e1948a2dee65aaede4da4907e228ba8e52f84fcfe9ad20f2c9d6e3aedfaeafa9c4718e7f92f928c4a62c98d9975290d3c62f91cc5fe6a0e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1632 iexplore.exe 1632 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 3008 1632 iexplore.exe 31 PID 1632 wrote to memory of 3008 1632 iexplore.exe 31 PID 1632 wrote to memory of 3008 1632 iexplore.exe 31 PID 1632 wrote to memory of 3008 1632 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9befb7a7632b1b8b0aa0728ca67230b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518500261aba7305279de2f9ce7e35725
SHA1969b9d697c464d33620bb6fc923fd4fa8b3ad41c
SHA2567f6b9b15288d33ef3684e81bfc7f38686b443272f58cad391ff70a144dd514de
SHA5123c18c13c4ac888f1da2543b79f1c947ada396214eabe751e7f597b2a455e34df4ede6362da0eaa927bde108485453dc14f9bb6940ebc3e3a5636baf5d2fdc248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564a563e2736e34af464b0c477365a7f7
SHA1f06ad097b7c2b391b2cbcfa1c74d30b4984fd16d
SHA256d835c70d39d659227022e7f281c9a66b8b6ed52ec88121bf00dcf407246f3a1e
SHA512e8ccf537f28621527283ce7d02df0733200f3226869138c2da4e63f25f8c34b75d6d2298defd97386f9823b536b7aa5260e480c492cc2a9b4fc1c22624cdc8d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc82f10251bf85cf4861b98ff7ad8ee7
SHA1e19fe3caedb799cbfa693367b99d1151d02ddcd6
SHA256e9b6f2a47362d418a760902562a1d4efc81a0af6485bbe5548213840dd387bae
SHA512a0f08962e612aee96201e37d186e7024cd585820ab0fd9c8e69c2577006dc6e734bc994feee9ea7bf9cee0996968f5b30ecc043d80a46b5dd72a66f396451d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c02d5bb2e644d2b08ce50c19a4cea56
SHA16ef207601a8553063f42adf513a84cb29c288811
SHA25692a6a3318bed7b9786f516eb5fb0ee70d7fa29e9f434e75cdb3dd9d4eded54c9
SHA512ac6f130d64840c24db4f4f9330ceb0cdb079f949f11f7444a95c64ef88ee037034bbb144ce7c6708901f9723f2cb855029fdbbfb47ffa96e3870f8f4bc49bf07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5738b6777d83bfd3cd50d4317d8658129
SHA1b2c21ff6edcab466451c7a1fe1af95baba93673d
SHA256b75d82c702f090e50d8b3bddda095844542a9202963027ee15b37b74ce44cde3
SHA5129b500bb03c3bdc6f4cf719acd938bd16c5be33cc7e34513421dd84c0042f57b436adb9f2b899679a856e4ac223dfb4f811db95bd909c4f961e00c4ee658438c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573bf909fd6ac5fe1b51fe6d8ba1bb451
SHA1d53249b4b928d36ff4326960e85571b906799f44
SHA256d3d1fcd10af2ccbadc8dad95daa3485282e661d489b14ce83c9f627c8c04a032
SHA512af9fbf2327f460b3300a89ebc3b5890adbdd6285ed2b9fd7e86b8960616893db79c94cffdc4ae2c709c28f961b1a4fd24e6ee4701ec27e289b5b4bbba0cb339f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505aad6188084538e772437603ce229c6
SHA1443379db2f67ee034d85b74397119a1d2491aa51
SHA256a18ec610575dee9492ffe161095f6f6eacae29d6eb474f45ebe81dd65486a862
SHA5125a9c29be98604dfaeacff56cdb5a387470bb44e6f292c4aa6f961e99ead28c467cb4e5ea99cbd70fa349ce7db070756d7895d7e30fce2de095b2a43405946d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58633000eedb429116a2330e63f95f69f
SHA12163202383ebce15eaf49b10ff989eff568a8962
SHA256b50132a6072bd735952be9fec345cd9a6a82e6046b13e9c8ac87a54d1a03ad02
SHA512f4a258510bece0c8eadaef88feab42b5c46597f217f001d82ae2b26c58a418c1727e6a7196bac79ae6cb60185e9656db6abe8ece33366b1658da39a685a01871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1c52bdd25ce79bc397c6cd1a0c4f74c
SHA1955e35fc819152815cf3018695edc4e531e8ee17
SHA256852de84d2e9ac223586b41d4c9eafe33709e8f9eda844599976521f24d7708d5
SHA5121b829e94dc25d0772c5df28d387bb234c8d1dd586cde5abb8eba2fb69517722314b630d666cef2a4f77286651d3efc99c78412a923e329ae56e50054a8cb49a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8687f83ba40f4315885f4cf26633629
SHA1f040b68ecd88c919863383f4a173964f51b13df9
SHA2560c66e6ef57627c2b1d24b61a4d71d11add0b34980ff76524dfa1732d9481d748
SHA512a423779cfb14b6c3c7e533c9c06bbe203cf91dbdab362004dbe73c4c22557def142cd4f4a8a257181e182ca8c8a004e6c8accf27f72a5cd06e444983db6a4d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d016a4598a140927819c96916c17b3c3
SHA18b1d01431267eb8df96565c751132623e4162bde
SHA2565ecc2301ddb3fd0a120cc45bef4bd5292462dfb6484c90fbacb55311f2675536
SHA5124230d93f8701b9552ad803803901654a2ecb40e13a84aa8be6e45b5704821b935cf3b8e9e4b6001e3f2d1b8087d1faa5922d9a41d68664acbcc2ec828a7dea6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544829905f6fcf8508955918b25ad1230
SHA14989b5ff13c63b8fd6a2baf5988283830bbeb8bb
SHA256621b7ae7b1882b4f8569a86e991cb195d797cdc84eee4fadb074ed5ace1d259d
SHA51264d8bfc574d87001ca67f665036c70b37ca31cafbff343755a927c97b49e7ed4abaf3132172dfefd2af7a23b1a4068f87a9d396cf4254f40856ba497d83e178c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5434af5955ce2d7bfb1a87e13ff8d086d
SHA199ed76cb6197dbea97340998e62a4728fb840fd7
SHA2566c7d3650402b1515fd635dfe2d382cfc90b362c111447312f4490ce57514c436
SHA512a0790920cbb3a5161157570e71a1172a7debe785b4228ba056031425695fd1e18ef6fac3aba533811cd5530d69a635e7d98aa6b1e395dc1ca8a76cd195f592c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa4b56aafcf7318bb79bac34a31c0fa
SHA197057f521816bcdd2d465db41445b3f0147df65f
SHA2568e7e66b8c75ca8e849a5ea88b60be3359804d2ff3186b80701a370b134212ce9
SHA512899e701175a9b8887dfcd8857f88bbc4e26c771b7bf369d0806e32ce934c1badbf775adeda408b5a4763303cba45641d6ed67a4275db20b52cd4e32c6717ec22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584ea1a47b800d5db520fc8b5cde42863
SHA1f884719cae9c64e0ef851aceee94882ef541d602
SHA2568c741175bff2ccb0543170f2e46f92adbd642a88f8535b2dfaa62fd0b2d62ddf
SHA512639580f555d1fb4fd01777a61527e44fd24c42180064015ab64e568b456b12c2f86b7c0027c4a32d5edcaf2211498136f2d67c6d78746d4078738ff8ff33f8c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c17e3abe2528f6224cb938082bf88454
SHA17efb87919abe3959e321ff8610cd5b4f13b456a3
SHA25686f3cc7e9b8224c3ff7a85f645c759f8dc3d5f988b384eb651339f47936d9e60
SHA51271dd2c9f442f42071622258d155b8f0f283e516c33347dd74c84a4d0b4b21b3b18e34eb060fff9abf662e619918eec0bfe9986836c10328ae32b18f01314a303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51549361c8457e98ae4839b44756b6a4b
SHA185352e53fb4b1f7e4b89eb54c73c4fd01a4a9c38
SHA256f5f5413c1849cd01d7ee2461a4e302cda1eed781fe9a3646e93a747883925622
SHA512fab1663404a190d136e27073f4006ea7e116d0a2ce8ac07b1279ab25840ffe68ba36a0f20bb37982b6ed53028f58bb8afef12206950c84cf5b09c465cfe328e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517af730c4474624c7cda6a02ce9a2643
SHA1c79ad6867c2b6415edf2d5ab1087b50179da6fdc
SHA256d79c4ef638df6f52555d1646664aebd555402ab5d69e8d7fd01c45d8cf7e2d5a
SHA512c24b499bc96bf61ffc214ce5c8e5294ca5781e0a66bf08696c57328c794dc349e03bc2999e2cc5ff670b01aa5c328ada05ce771676f738beb81e532cc2f33872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5207bb148c2649bd7face678fc04c2eea
SHA1a7ef3baafad02097dd0966fd6ba514c8d4103d5f
SHA25683953537ef59f9ff2bf4497aa15e6cb89418bfc355638712c83eb20ab8d64b21
SHA5123ffc24e68b8c19c8b6cd367db6f02701bf0c6fdf93ba2916fca8d0293e8d4d8a14a8a696d82cfd5e2e21469b0a554f8373c07852a9aa3c8973a3386b73433182
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b