Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
dc00eba249f71ea7c5212999e16d77db_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc00eba249f71ea7c5212999e16d77db_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc00eba249f71ea7c5212999e16d77db_JaffaCakes118.html
-
Size
1.8MB
-
MD5
dc00eba249f71ea7c5212999e16d77db
-
SHA1
b32f5f54f67e5fe143f8fe0be0bb4e641d3a1aad
-
SHA256
a38533c53df59591bd55fcd83fd35d582ba7ee11f91662a147236063a0c19d15
-
SHA512
5034f7c8851b35c559f42efcf3cb4a0c1ef859dd2a73fef270ad229266444339ec289e31488a1527617242f6940ef584fadc749edc8967cecdb1891087905931
-
SSDEEP
12288:W5d+X3poCPuzmrugwG2qMP5d+X3poCPuzmrugwG2qh5d+X3poCPuzmrugwG2qZWK:U+aDHsm/+aDHsz+aDHsjU+aDHs1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000008ab6b50aa64e2333d7ba91d2c831d4d31a269167cbaeeef21deb1a25a4426afe000000000e80000000020000200000005c12908ac6f29d40f370c362bcf04147a7a0cd6295ce2737c42080a3ae2ea45c200000003b9ede58c312c5fa611b68c8dea32969a653077138ea034f7d42ef327fc775be400000003969e3555bc3005b245df50539ed395ae89b8df878b11c755f7a5649abf182e27fc213d1ece137245620c2b120b15b3b810e7edfd2c433fc7d0a54e682685123 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432285234" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{385D81F1-70D2-11EF-A0E9-C60424AAF5E1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b04bcb13df04db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2228 2096 iexplore.exe 31 PID 2096 wrote to memory of 2228 2096 iexplore.exe 31 PID 2096 wrote to memory of 2228 2096 iexplore.exe 31 PID 2096 wrote to memory of 2228 2096 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc00eba249f71ea7c5212999e16d77db_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a59c0e928c2a5faf02ba19e8ff7284dc
SHA1db009ddb2d7e9566ffb2e2b26e82c0c28eb1ef29
SHA2569d7f135a2408d9edf88454aa7eda6e9298e10c92a542e09428cae1572a783185
SHA512cf309c3eb4d1c6e525efb5464312ff0727d050ea884681126d8f9330625d388f10517aa39a4685f94410cdd59048538a43f6eb1719b6232efd259d4a81f30565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532ba722b1ba50f64973f2355781571ed
SHA16a14652f27c4830f957ec0b5ac736c8c90714322
SHA256e6ca6824669c465f6acdecadb86931023fb1d41eb45317e1a32b5208041d48c1
SHA5125e3f5fa7d5c495d2cd5f286474f3233a9b68213ea99899236ef3663d0ca1033881bac1c7669ceb600cbf57c0b3f5c5a554ccea6bef616119c0e1e9e37f897f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de8ab471fe00aba34510ef17aaa32080
SHA1308dd7673a232b305f3f5b892fcd3a1154e8b816
SHA256269431497ffb41964a181e4dbef72877598a5ebcd657ee040bc0e31fcdbbdaa1
SHA51296c9e5f326ebcf160f37f1013ab2de8d84f5dfef9cb2df94a690a23fc36632fc06d0ae886ec682c52d574dd040a4f9de79bafc81fa2f65847006848331c80cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5473dada7ce9cf651a519b39406f90c30
SHA18ef9d27101600a8e99fcb15d73ba1b65ee709b43
SHA25647fbdf38270a2c28140c4d2c9d0bc23a57cbbb2058111b7f5ab2542c82b3ce67
SHA512f34ca1b2886df8395c8233ed1cbd4f4c2d267b812d31368e0a0e7e8aef999716bc40a01a200c9e67fb67cb127a48667bd724f1eb402a223f95651fb6a4181ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b213903b138b4f6cccc7b957187599
SHA13e40199e6cf87fd7924ffc0a7a6aedc12251386c
SHA25691b166f7363cdfa9de1e59d14ca688f4a12483696f28612031441a99e84072c3
SHA51209cd5c440a66186ffb0fa6aa678235081df65d27365f1f290bc485b488117772d43a1559cdd7bfdc08175ed9a9b2b60d203f23d533e9132e4f4ec64bac9c3490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540f4363121f15065a32463038f55b697
SHA14823af38514dca03d10b754d090d1200457d8d3a
SHA2560fbae56fa533140c8f484f4a298737a84d1171d566db84825065aec10e0f51a4
SHA512b7bcb9ee8f4a751bbbb0ac8e8c1edd4653b88b9ddbf66d6f9046103f41939f940ce2ffaf9b147356398a3d6470b5ac4470c41aba8f38f1a1d13edfa54f20d50c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc91506d46241f400490dad1c8dc40c0
SHA168c3669fb66a9f3d549aa9b98b6faa6a15c5e199
SHA256891f5bc6249a7bfe256aa91d64a02d06f78a35aa3b356da64322527f4a212be6
SHA5128c38fafdd74736de754b0b71a0701cbf498c29147ccaa81e5ba0f931e28aa731396d4523e210f2915ecaccfff925b594f10ea24852e436e8a23c975f32aad5c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590585494b8da2e78f2664433d9c35673
SHA1871fca1e9dbb6801218cefd8306c95e43a4507e3
SHA256c952215b34b0686571ce8cfc6ff412bc0e4e825e26fa1ab6edb71a5f1b078ac6
SHA5128c7bf8008c01936155c580f3f66b3ccee70d3109f4f34f521947d24972c86a41cc46ead64e12a2196c4f9e58f6f96538d245ef9fea720d527e5d60314b149665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5771cc620a9782139e578b0eb2becceb5
SHA1375964656830e679a075360a112cb9a5d31391c3
SHA25690a7de04ae21ec1d912a3f378c3070dcd9e89f210b9f084268616c8eb9b975f3
SHA512836770405ba558f4de81b476aa95bf2c4b4086ef4e57ad8a85e20ce46f5b94a40f6788a6306df5dfb1eedb36e2472cc1cdf44c71b2281c2ed973a1505d42bb85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543fb078a60286bb36cb7fd5cd6fc2495
SHA1de9d32a972f69ac966262a512224a4a1576471b3
SHA256f40586718c295dec05052fb51d6f8601557462b639d456dcaa5d8133164b1a41
SHA512cb7b679d6ffb70e25583aa67e64612c0a1c8bc920aaf3633934b5af58550d2152ec581d4f44ab7cf45e2f55e9b6ed9a68b610c9619456b1cbcb2d8342fb282fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a64108e94224c21c6487c5ab805c4df
SHA1057b679a46a027ca5cd83ccaa4ddbac3ad5bb53d
SHA256d90b1782bff3e5225710d20b535ad2df71cd47ab59dd73cf0b9f6f3f74843350
SHA51231b394d4a600bf87a844661c210957441d5cf2b540889635e2ac5bc320dc729691a7b1ffcd1b3bd3ce671444044166f8a89339b177fd38b476452454643990b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587cf8572f1b68d8d72beecd343dde436
SHA15039ef413a2e2f50f77ff60d74f61fe8d4f7008c
SHA25674cfb3db5d423d1bc8c68b459f6896047fd421cf125968916c8f77c5def5b0ac
SHA5127bf8faf1687374debfe18b18bf26bc62f480a118a9b6f214c2bd87f5b9a6d495e58e43059998f63dc5520907a84e69ce83110a4976a4abc87dcaf3ddac4ed023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b98880a7d2dfba8898a3372ac3ea0f09
SHA169cebb678c09a43dd08342fc0488de54949bdd3a
SHA256b55da957331cb0c4da5506f6dba57d3bdf2d173554f44f5a35533b62e0c9f632
SHA512c1b724da13d881511aa54d221945cebf3966334065c41e03e12b84c5cecfca417428fa6cd79961dbed9ba942ae7d638573fa326b25ebc4d3fbbdb06d42a0cfb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edc8854a06f8a9b40f0fa254f39893d1
SHA171448686678a10a66d602e6fe17aecde6286bd04
SHA25678118e6db1c9ca33d5895dca92d9311fba954fe4388ba8717d43c6a9a7d5a682
SHA512e8a18ca028bc9ec6f6f7c7ea0b82b2140d692a99602917f1a23a001166b1a5ddb5aff31c3cbc1d2c00a2424ef09b59803b3e74777dbb74318d313fb447877cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf4a1879e9552b3f775400f4d90f14c6
SHA13d7d611f67d7236ba846d0aecab52636184f8696
SHA256cb1d8330100f5a32690164548bb8baa664e8682b901adcfc3e6f70e7e24cd9a9
SHA51268df0ccf5eb4ddc43d3f80b793956cd566177b476b87d8e56b08317326146ba154c169def043cc3af33f985807f46ee76e2eb545eb9c027ad9646840f883cfc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d55ff3b8ddc80ef9489f47d78d09a79
SHA111841394eb0531d8dbd303535077bf113eb49ec0
SHA256a35d201affc7ed4346cda6097137fae1590252e2fd3891fdcb918d1853b1065a
SHA512744dc2740c730fe2f7d2b11d9410dcc4f40e00f4b1e8e45e24809b62d7211312f8818a29c695823fb3d7328af2ffbe1f584811c636373fd2bf02aea66d2fe65d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c16c68f24c18d0c39c8bcd5e5e1e9640
SHA170397ef220b62e6e0a21c30e3034e7abd4c55c3a
SHA25653b8d5392a5a77852178d1db0f357acf18fd22e0cdc22df9a7cd6c804e30688a
SHA5126147691fb6ecb5be69d90049b2d83dfe7dcf9993f3f54775bf9e8c47f3dc18418a9f8172c2091496a8d1b77b024165143b04be050023d3b66a199a0ccfed4a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5414f568693dd054dc6053b888c101818
SHA1c375991f7c2d57e620b38274df6089ef145e0387
SHA2565cb0f9f185a68c932d739d7fdfb204c1ec5336841a17e9f72ad623188b93bd05
SHA5125de73d0a4b58f8906d659a83307c2a95599f0054d91e9b8d61a38a13f44dc7500137699e2ee16c6497976bc8cb6556cd5b51a7846c35c0b95b3d6315f88cd0bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e78ac46b2f9fe4d47bae05de412835d
SHA1679d21c009eda78fb41ab6afa67f76bd3144162f
SHA256baf6ebdc94aeab6e4b94349601b7f31584386037c57e24971f9911dbf8a9171b
SHA5123675b17cfbe805c2bb3b1eec855be4ec2bbe7f94d49c0253fb99f645e2c508a368cb68aa81b47dab3447c932ceb1d91ab08377b647dd583d1734ffd27efce528
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b