Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 08:52
Static task
static1
Behavioral task
behavioral1
Sample
dfdb0bcc2564558e1afe74523010ccc6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfdb0bcc2564558e1afe74523010ccc6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dfdb0bcc2564558e1afe74523010ccc6_JaffaCakes118.html
-
Size
460KB
-
MD5
dfdb0bcc2564558e1afe74523010ccc6
-
SHA1
94e02d8f9a962fc25cc0287054ed26ba12a9d960
-
SHA256
8437a7a516e2569cb9284250e55f07b5d3c694f28408b1842bea090c5dfe8314
-
SHA512
9eecf075276f134d7a4a4fc21aff5fe7babbd9c161f162d0bd9cd56ffc582978f5fc92360e5ce10f302c12d62ccd98ec6a8405302d71a795ccde0d3139d7995e
-
SSDEEP
6144:SXsMYod+X3oI+YzsMYod+X3oI+Y7xsMYod+X3oI+YLsMYod+X3oI+YQ:Y5d+X355d+X3D5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60103c978306db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000b4f3c0e419104310accf678c4398774d1260ee7e353b63bba29ac67975e457ca000000000e8000000002000020000000ffbc714ff90f05417db89dba6a6b55fa27a58a832677fa3d1eeb4e5e1ecde17390000000505121bd7e80b525065d49dffb18079e3969558ddf67e86546f9a572d0bd0d5d2cfead27f8cd16862d374758d4fc54e8a2aee57f7a91326acab957303036ceca35253178835d81a6a0f3ee0e00bedc9f1f8601de480efad94dcb0ab4c377d801868fbd238910baf7b09c08de19528fc25cec9df353fde3714cde89685c0bb6e88fb391c6451b1c0b737afe8f72bfce0f400000007bef40ced556f718f825ca2a7ea548f65bf97d985baf5c3014967b3653fe7b4023b66d56959a8e77ebbb5f7c0b1044a3096c52967f04fc04ac085b995a9a3b5a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000783ae3b1226a7b122ed17d201f9aabd905e953c697fbe590bd2925d38eedc641000000000e800000000200002000000067ae88fc6b0ec0f4e922b19ddace37f615738a3246b4dcdfd9176e0d3bc5314720000000ee28d87f2a3d7021730073686026879d1325bec1cdd68f84e8248101aea6ce3e4000000086594d9ce832f4a394b8356faf1a18dc23f9e7281aba6ea55e7140eae290e9372eaecfae1497f64b8dd257802fbd6ab3165bf2116f069104fe53c92cc53fedef iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432465848" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BEB36D01-7276-11EF-848B-7694D31B45CA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2644 2300 iexplore.exe 30 PID 2300 wrote to memory of 2644 2300 iexplore.exe 30 PID 2300 wrote to memory of 2644 2300 iexplore.exe 30 PID 2300 wrote to memory of 2644 2300 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dfdb0bcc2564558e1afe74523010ccc6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55217d5d856c6190ea93cf4fe803cf4f1
SHA153bd4044fe80e481bdb22d1519aeb1b57cbed376
SHA25688752c57075f2fd80ceedcca6bc5b45e28afc8307e75a8fa9bbd7708bd256d30
SHA5121c940607ff975865ebf384230fc66c39084d759e655b6977c150d998f399b45e9c2b53f2975bcf5ec8e836f8f849936e0d67b3f98ed179dd4d03eda0876fc137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509ee2d59f3aac51a779575610aefb922
SHA173e38ac0bb10dcd93740a1832a6ab673554f7560
SHA2562cd77dcb57b0a1d53b733c0ddfcb36d143e96e0658661030fb61a13e23455e12
SHA5122a3eb6c48c4d4b208ff0259bc314cfd39c06595ca873c4873fb5e42a1a7893341e3badc0a85126bef857d4877307a8fcaca128707368db617344bf3591b68c69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ab8113eca04f7f8c952787bd2abec15
SHA15ddd1c8647421c4d73d2264bcb26c3df890eef9d
SHA2562d277f43f8953003c69213ddb14f67c544c3d42e1f107ba9744bdec445ee133d
SHA51214cd0d0c73c83d407eb8ddbf76cf05cb51ed5113253a0934f2bdbc422861f27f5a71bdeec547b82f4d6e3a21366fed0c2937648d79e6205b18336b12f37db965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555322a2d067204ec7eced7612463dd8b
SHA1fc39c661f3d2c54dab34048fe6871c290beeb0f9
SHA256768cc2638bc16f840a20e9db37dc835e9fc3faba6af144cbc1a1e17a3388a1ef
SHA512106ba0fd0dc561e53cb55e86627e9febbc25d24f758ac046acbb9befa9bf7b35de024098ca615f0aa8e26be093d9325c78fde71cc0f5e6213cadf45dc5d66ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a60a0e80bce5716fa9b0bb818d9b07c4
SHA1d336b0af0b7acdfa9faac982262563473417f62a
SHA256a116d003de97adb8ea70953c002616cd28443344d47d6366456b69e874198f15
SHA512181cbd4239697acc0c39b89a3263e79cc5670aef2cf26cf31e49ea38ee30bb91ae446798c399ce9a2566d55cdc14b2df8ff74af0e4ae804930906f8212753c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5977651a831b312ef2439b6ba2707ce42
SHA16e10b8f9868d56ebfdf7e661f3b42377307222b0
SHA2564b647f2bbeebdf443ccbef5fd4a70e5df62aface873c1b308eec06ecb8acda82
SHA51231d997e3156937869a895dac5cbce265ad0529583072fd1fd90ab0770f17e18094e420562ef3b87a12e5f32667c4211f6ce0e45bde28cd4f39db550bce7a2276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fdf3c75f7ab0c3093fc67cfd8821c92
SHA120fdb55a7dbae16b6175654f19738e52ae654320
SHA256a4b60adc2e05f56e147d2bdfc26b2c59372e44e9e95142408e4f7f08bdac3069
SHA512f43b9025d76941e2312361d89ddb4501e6fc270d47e23faa6d75f4e70d3c0ec3d24c23f9228fb6c109b4082d6b651895bfa9eb9908db28c85c45ab554e03f5c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552d40fbe5762e14d285af8e51e250485
SHA1b6808738d6ea3fd3b66d433c45e1171c542c2510
SHA256b08e1a93cb8ce3723ae04e8082e3552e5fd03dfad1f2ee1e062b3d1e6c8baace
SHA512e7814f8b0104a33b5fcee0ebb8e6600151d8ebbfefc624938f264d65e8ef28fa39e41b55b43507d73a92ad6e0dabf4e79bc71917a04631bbde460b9f9a064a42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56245a60db8a255908d8aff3fe8df6833
SHA1d93397cb37dc5b1955ed41e555bdbbc7765d7a70
SHA25686da9dc776e970aa9669888d6d97e3d7f2a126118e447f9f438b3c1f456f8261
SHA512cb83010fa6afec0bb751a7b5a3153281384e707f8b40d18b9509efffefe12e817ceccd27b5d7554f697bb4cce1931769bbe173a93f7458f464da057d61c8c2c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591432e959ff750fea7151c38eede92a9
SHA1f6ebd3da9939f24c06f549dc8667c44aecb23bcc
SHA25690af4617b36b5c231551820c50ca04c7c7f10668a2f19e3ed0e1cbfa9b4dcd67
SHA512334ff1e85f71d42f92ac5b6e9eeb4098575d58733514aae45deb88f309ce70196dc23587947ada99351cf2b5f07b12af6845d1db1e5e23eb4cb3fe3f39c1985a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542a1333b6fba72d116053bb493a3ca65
SHA1099ebf032b3eb9da508393e1ec567b40de0fa1c1
SHA256232c7fc0a70f9fd6e43416ceb9b1bbf66bc340fe1a466458e8988e8bb0d5bc11
SHA5126f9e9727aa28ddff6224826c6df8a1487804a49bc3d9f462d11023fb7052e1736128392ec07fcb28776676d1abc9fe48df65e876ac50954341a5047c3564520a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a163cbd54ef738baed240ef90d675f
SHA1effba6587f9b07e16cc982cf5d5b93fc3001efae
SHA256d8e0843e08930d6d71890615aeae2e8cefbee98dd8de64589ddb30c786acc24d
SHA5124417f94169fa2f68da71d767ac0e3b7760cf7426b4b42b2a9af59c5755cbe3dc10921d94b81018d510e88142fff7c6c856c48d0bf8b84d531dc5c129361e635c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5876611361f3f9ac49e4d8bb1ab7846a8
SHA1fdf291989eb195c2a0f3d79fdc1a5fba58b4ee75
SHA256a71fc21415b058c1c89646a55c52fec9d85ee84784b07795a22eb89f9819da5b
SHA512e4548af86ab8acb3f3a6f0a029f0d6d0f8df34091d5f6d0760a45afedab62a0ce1dc34ac343e81bb0ebedca0da54959aef8ffdcfce3ad97715f09cce439b287c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f87c874ab673006d1673711b356d54f4
SHA1f4e45c38055cfb4cf4664fdc0a239ef1962f553f
SHA256c243799b707c350ad5765dd2302b5c92dc37d6ff5604787ce460af6107375023
SHA5124fa898bb7bed73d717a96abdd6d962db3bc70359d64f934782c4fa35e88984e7f15d0795e14bbb21d775f4a14c3e235d8349d82252ae2e5091e25ee74ff70f7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c334f7c1245662b09b4e57cde4fa375
SHA1a8de56496eb79962058dc9a27edc57923f65c068
SHA25619a864feadc461b67d7530480d534376d2e8ba7e33c6abe74166e7129d15c3e8
SHA512567beb738f1f059ab8c82396bf34a3231c96ebf2d18d2199b5fa06e4518d4101b3113a7eaf47e059e3a387ce4b5af49b1c2f3455be52054362abba7390f802c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2573c1b554fe4e38e7c54cf20264bd8
SHA1af2166dab1d5a954a55f96a4495a547208970e2f
SHA2566d5699d1e3af9efc80dad741038f60db925d76bd7b1acce2c1371ed4dd9f865b
SHA512f8b3bd91e9d23d4096eec1146248144d755efe4530688b66caeb03500070a772461ff2092204c67144d8495a477e420228ead8e73189288fc85fa4cbb1f0594b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585768d9749a951b621e34ea3c8e384ee
SHA1cd563704da4d729dfd91a6d91cb71acd8a00a081
SHA256cc58c2068830c91b7abf2c67609a2c4f63b15ae6dbb5a1bdf7571a363ed8cdb5
SHA5124ac0776e4036e96f83ced1c427c1984168f08f8fd07e2998cf60e6ccd6d33a6dfca88cfe44dfad1b7b63cd573a19f1945080e96c08800d87cf487201dad4a3b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a023de73aa90a826f068c86a47babce
SHA13c8dd0aa6641146f626f28b3bec8a4c4ad6a0d0d
SHA25618d7e3318b149dbe97f27447166ee38ffb0f7219b0964f1af06ed16360da7638
SHA5122ce61b5471b022a2cfe2ecfb9fd1806311f63cd1bffd799d04a088e6f3cc64882e601fcbe15f815bd43c03d6422eeaa0d5c21550774486764ff1cf40118a37ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ebc3f9bb10bf8eaea804366c5639c3a
SHA17ea40a3cd69b3fb22a5c5ac80e7bd528558b7af7
SHA25604959a340abee3dcda1f0fb9fbe726365b4f4c10383ba16113ac16f42248179f
SHA512ed979f24e5f2ecbdd2e734433eeda6a36f8eb5490760bb859475246ab4299f90959d18a95da74902169e7cca68eeb06e9301a4f076c9764b35feeaac30ec8867
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b