Analysis
-
max time kernel
118s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 15:38
Static task
static1
Behavioral task
behavioral1
Sample
daab9a9f20b966d4ae4e6fd39ca53060_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
daab9a9f20b966d4ae4e6fd39ca53060_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
daab9a9f20b966d4ae4e6fd39ca53060_JaffaCakes118.html
-
Size
32KB
-
MD5
daab9a9f20b966d4ae4e6fd39ca53060
-
SHA1
f2062382f9db78bc81e8e5b5dc560c1c4f7c3291
-
SHA256
1140d6926dc855ed2c23331b23976cbe7411e0f23392c4a41f726427c35def29
-
SHA512
2b184b8ae5c6f68f164879aecb9e6c1c33eea8dedefe8df00fadef62fd7eac7b4f3cecfbcc52b616de9b09821b80341d136617d9005e5ef6f87e03d194f9e2af
-
SSDEEP
384:MKcIG/2uPLqmx/uBVcm6jbpfLJVyI6rebUmdKYZf3F9FrKc/jiD87JllAtZaTaXO:tcIokc3bpxwm13F9FziDuJllkyab2quZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e1e5e96004db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EAA66A91-7053-11EF-98F1-4A174794FC88} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432230989" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000027c03f69d46cc24dd3d17e43bf5a62616b9544a75b46343216d437fdafe45c3000000000e8000000002000020000000f87077ce79de9e218ea41b058edf40d276bdb5da57aeebefb0fdc9918dcb2eb020000000363a81c0fd25e380d2c5c0b44b1c63ccc3f7084664c86eee3342c2a7b79711a240000000c4d3173c37877ae6583ed23b1a22c7e44b800679b0cbe3417e80c94d19fc802cc26e834d201a1ce0bdd866d0076eaa8fe9f11dacbeb10c1940f252dfaf136edd iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1684 iexplore.exe 1684 iexplore.exe 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 1052 1684 iexplore.exe 28 PID 1684 wrote to memory of 1052 1684 iexplore.exe 28 PID 1684 wrote to memory of 1052 1684 iexplore.exe 28 PID 1684 wrote to memory of 1052 1684 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\daab9a9f20b966d4ae4e6fd39ca53060_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56daf7b81c77f3846df9173ef955a177b
SHA17c9a1c62a3534b178e5e980058686574329a98a4
SHA256f6df4fd5b17c4eb9fd32d4a5ae4a1e19d141f2dc5703bcb9770d8266b2e35e24
SHA51275aa0f03b9c010dd64416cc7eaa8e8a7a375b31845442a6b50f59fc7a071263df34db1d7340d2e53392cc20c875e30672399c34f67f9f90f45736ac4bc3dacf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a311ab7944ec6422869da4f19c46d2fa
SHA1f0c2790997316bc85b85a0c6faded4ef6bb0cd30
SHA25696d6c6873162e5fbec14fbd889207c63d5bc18bac9d1fb052eda865bc3044194
SHA512ddf7b8816d04c67ecbfa33e95c82c247847f8429ce73d8fc63a91d0e142df35aaa8a548681a78ddd6391f957c34ca54a53e5dabaa84d1af63789f5c83b1e6667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6d504fd85de13793e055a2ebfdb469b
SHA172abe87bba7e2b3d9883880d23b5940beb999cc5
SHA256c8e42ca5a2940a65b170dcc6d4435fc5fe5d60b668b5e36c6e6bddb5d87a1f14
SHA512b1a65f0c9272a7b10d087cc39c5255aa79de8d7ec79682f25a2d94fd0e37ae24f8c117917b6c6026b13937a8652ecf5d83780b9f026d6805dacbea5f20b5416b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519e59c2c5b6d6749b56e84785c25233c
SHA1d9ceedae308bd5bf365939e50096d0f3c7fb3bd8
SHA256fff61fd3608654952fd253f172fc3efc47bc4d2fb9f301c24e4e8ced418c6d37
SHA512bc510225c216106e84489a06ff71711131bba5312b1b67ade07c7abeac42b1230c1e32703965cda97b85212f87b6be08b1839f6906256ceeef001dbedc29d066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c19759d8c089ad258c489c503e42dfc
SHA10e46f6e469cdd1853a973ae2df3f50c753877b51
SHA256a512aa26a9aca1e936c1cdb4b2d50df94f908b1312afcbe7d51302235e0be414
SHA512b301d55072906690f71b78740022a1905ea26b13afc29e7dbca05850485bfc48414d27122151e477a778545c321496de0cb240f9c376b0c8b7180c99a3ca0770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e30d562bdcdaa68e07f4f9f741c964a
SHA123f6e12d6f6d7d080cac7529d45df2c6acc14b8c
SHA2565b569c7ad9ceda6724445014022daa15913072ff5cc1305e31cd0e452846c58e
SHA512b8e8954f5a3c1b167a319fa82c1c50b18d6e03a18cec6fe0326b2b581835a866e2fc8d0d025f9934f3cf55a88452cd57b72608adf9db8c57f825f21007c8bbd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6aff69e42f020a4f13c680e009c5c1c
SHA1d2f8641dc632b06fc6a1dd47fc5068c39b190e23
SHA256c660a259aae1367adf16fa6b6b8bbb72369ed54fc09a07e539c4f68678f4ebcd
SHA512b5f3e588025bd01aaab0ce370d088a3647f9f67b8f5165c7345f53a9a99830a297f7361fd018922bd10465ed0db20d8cd774d5128fa67cdb5d03447570c52711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff6910f02527e7c17681019b29959011
SHA18f1a057ac35d66dbe2185348638a3c66ae99da4f
SHA2568b1319c39b798f468fcfdfd5ed499799242b0752ce9880a6a7bd3c4692138037
SHA5124b0c3aaabbaedc624890f6baf4877b31831c08f235fabe6c1ea9c0855a45bd9c8c92c1466cd60ce1522e22395120d106e57354b1e9756ad72a4d07950e06edee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52788855d4ec172a8a22aba831794ac55
SHA1187f43f860fd67c9a1ef98e417c14d794c1d5dc4
SHA2569299e852e79cfe515043d54c435f04bf7e0502bc3cc07b3681211d44866f2530
SHA512b3bc382909e7591238a61888403bb333702277e5080d4875681df14d539441ff29f6fdff8e5b277a2826e4ed39824c4af1ce0f60ef36ac5aa9aec033fc22d295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd56847cce8c18fb3ce28da34d93e856
SHA18ab52db67bc450d1a9257aa762d82f30663c9440
SHA25622ecfc97eb621679758c30412181f95af6aa89247c173c94eef5f872d61070ed
SHA5121869804dc61cc0cb0b922f78fcdab1d1a7c05fd1c59a708d73f1f6e48fb172f9a37fbfa66f75e05546a01f8fea02c3058c217e7953ef264d5df5aba3fc220732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef50c35d3518c43a1840985417c3c467
SHA15694cee62b8e6c1740c97550e1f0fc90787e46af
SHA256c460c3cd152d43aea65f71f080741ac135485da0fd72027b1f9da900299162ce
SHA51261bd2da0231eac3cac9c79770c3c55636a96cf2ffc391817a949d10987c53ad5aa9a340cb0bb9c6430abb7cddfed510b543a759be91bd79874423a2d5d0063c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525dbb62fe2c512917e540fee058d15b5
SHA13a2dc58a254871717c5bbdd2cfd76c0806e3b6c2
SHA25618985414c4b05f4c4cfb17ff8a14879f3934a7f0a4e2869cf0645c2c97225d1f
SHA5123bb91a699dab6b445ce514578ff7d2e431d9ece518f2cb2ebeb9b3c30783aba62fcd985d668a74de459b78a4b66b6fee04eeb2323ad1395fb582e6c2e255a4db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ac48d9e97c2532aa2c8398832cca033
SHA19b0aa6fd55832e81864380b6e008639a045012a5
SHA25691a45820cd91931a003fbdfc806af73939263c3cecc5162f2a11a28bca6f2bc4
SHA512d7d91c7008f1f90f7bc805b94709f087f7dd3193ee98513b2f3443e0966c987997434d54fb7522b770cd730d473f58fc227b4f82fcfda22ec8e933430080aff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d0c80fb54ed3dfe93144b493b246c66
SHA11d3adf7dff1ea498815118c26398bb8e13af3ae9
SHA2562c44d56dc8d843c6fa1e9569ddb14493b1e3f4d52489d10367829b7247a2b51f
SHA512d9ae25b39f99ea88f3e27dbab7ba688210dda8272921b27a72272c66594dc02b379347213951b464980ba521c9a0761fb457cea95f6ec61266e89ffc01ec70ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e3f5fc0019b24e47509fd5d5d692601
SHA11cf7899258b3a18c4000f2fb40fe557a2f5a1834
SHA25605864701c4cd8321c28dd9ed6415041d7363447d23d109fd6c3fb6c50bae625f
SHA512b1c871575d555ce669c33a4155f1bf023e41d0e979e5a1a173dfc6f4697cf05e1196282fb527aa2f69b3837cb613ef20bcce2e28b4be1594979dce4551e0b649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5061eedebd3fb7bdf6d13961b760c5a6b
SHA1f2e45ccb2feb9c32cef934a829982919eb6394c9
SHA2562a3eaf6644814cebaf6b43e93a330cac1a71b606a9b476d78252e00ddfe71041
SHA512cbdea1e650c2b7133b2f76a7cde366ee2b3dce514ed87a4a86630d364ab7ef0629ec1630d24e53da6d54cac825b5ed254b71db336e090e48e48b1f2f1d67ab83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc9eecc1e5164b60f420918fe97172a3
SHA159ea781fd1680d163c5fc3ce771a2dd01de637b9
SHA2566adc8d6a094fde5c87f8a8a15cea5a9cd650cde024b66019d11eac41c559a358
SHA51234a34ee1494c6f8e32c170f699898a7b6d307d7d0edaad411ef43e436e964f364de408f00a3f6db43c2d22da937683a7477fbcfc993253c1ff675233f9eaa61f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574cc077b3bafcb65ba23449e5f98d34c
SHA1905aeefb30608de45c79620b04eff2689190a04b
SHA2563c6a634e2b7c877b9bb25128b47ca4aba59665329267a5dffcfbdc6c4cff0e88
SHA512ce86eedb1b743f19058100f2e9fee97b5468052d17e6a958668d14b548ad64a93f0206c4598649b4349c162fa6293cf05b130c9333a6d5821cbf850d9fc5e0db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e61c2e6dad15a5575492ca97b2f3f8a3
SHA171b09e3cec3743e5a086cb5fae2e2f312e6acafd
SHA25611180101e8abc10abd5c51e18c610254503f098a3108539add2ed2d3b2dbffc3
SHA5126b0ffe083d91f7407db5c6321092a096d34d7eaac52d8c8d7614f92ae4baebbbd859b4b34c70414ef0b5c8d1d74ed3742917e7e41ee2492a0ca082305bb24d34
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b