Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
e05c92f49a76fc55a08a1554a51d631d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e05c92f49a76fc55a08a1554a51d631d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e05c92f49a76fc55a08a1554a51d631d_JaffaCakes118.html
-
Size
213KB
-
MD5
e05c92f49a76fc55a08a1554a51d631d
-
SHA1
ae58f48a9d886f334f0e22ed89e197f77b62b76c
-
SHA256
4ca8cda4e89fe709b3f606bd82f3020d801ee0be8097b2dfbb7af09c8c0614ee
-
SHA512
3f003060c542c9e38180d73db067dbe754862d3784b38883008ea813df7a07e0ed0bc185374816fab21eb5d8a75d7b2e068108f721724d71aafe5255577fc52b
-
SSDEEP
3072:NrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJL:xz9VxLY7iAVLTBQJlL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432485484" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76A91C21-72A4-11EF-8F1B-EAF933E40231} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000ab2701140eafb3d4c181a8d8e2201125663d49b8a2f58ad0739b9f586a83d3c4000000000e800000000200002000000034677976a24b39f42b332eae843acd0baa7dbfb5729fc37eecaed77e170f89af2000000064b936680d7488a2c617fb2a5f2ca3c81491e4779cec87ed23ae1ad2d96993bd400000001bfe9614babfab8078391b734f21f462e957158ee6c715b0cd818963836c745aeb2c1fb9d6ef7fbb3544353c04c48d59c36ca1e47a19591e93c2522f1814ab45 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 206a454bb106db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2788 1964 iexplore.exe 30 PID 1964 wrote to memory of 2788 1964 iexplore.exe 30 PID 1964 wrote to memory of 2788 1964 iexplore.exe 30 PID 1964 wrote to memory of 2788 1964 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e05c92f49a76fc55a08a1554a51d631d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583e5189cbd2966be81e9de3607711433
SHA131d167dab29c4d287545f7432fe4f352d3e61992
SHA256f636db00e8acf5470b7426e0ff17196e0449972760993d14937dabad801027dc
SHA512c9ddc29bf306bf34a66af756453e8f8a89f0b8768d25fb2d3063fbc06fcc9a8dfcff5c4584aa9a307ca4a57dc19f42615b2821a9f5a3b6fbedaa15e1b9694464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53afef7ed0e215a544183752000ffcf35
SHA1523fd24acf2186eb752b872d901a714fd1afdf3d
SHA2567e8f0e03ca928e755594b08f9aaf694d335490b0b00ddc5de1bd5db6e9862a99
SHA512c5d25edcef58d9e0e1c818b34114956906e5006a752b8acd250cca530e41ef0b2b866d5afdcac6f1cca71b88f1eea78bc065b0fdedf0f7cdea89a40c96dc2c7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8186ad825faff043174b0a3b3f105aa
SHA191dc373ad142de91a39e90259b237dd37539885d
SHA256196f33c2a8cf78baf70b7f7ea13f3da5d578719c99383179474c422ad09bd801
SHA512405c78890eef6500ce6fa4ae39b3abebcaa259dc5cfdf1dcd4892df5cad49a0ed5af2eb4b9b9826289e2b944f66894aa175f317c64b6cae9376f8459b767abe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e9d47dbc81812f456a33b20a30c6f64
SHA1c11ed2c47af1d05a8ed4dd381073074e90b52525
SHA256246dec48db85dab7ac9cbc2a7f88b7d387fba07169c65875b69abac825bc8697
SHA512be6da73559af5903b2c5b29837d3e47f3e9f6c246672851d8a7c34d57e5cae1107e12bb9ad4824ec70df3757b20b177b468354f626803e154b999dd916a139e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504d98850642574e2c49443366e4e761d
SHA1322be38cbb5d24e55a0b306c96df057f3aca4240
SHA256c01fb858d42ce38e965f5e7857a178117b9b6ea0b637c3d57e0605338ccb052b
SHA512b424635fe056ab92f99581503d6c26610bdc910a11df58af0810426b195551ceb37223f42f0a8d583a179f35acdbb9aae0b103bbda622c4363334cf0a72dc4db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56afe00f6172bd09cdd172dabf14f9344
SHA1910aff158949468964d6706b989c72acb5bf0f8a
SHA25683689420a1f8b036903d87e7b893777a813c3887df84aa48e6a67543eee171b3
SHA512fa5971594d2aeddee0e777c25b638457ed40153151b394b9c4e757caf368e18a5ce34831fab14e90d31d93e61eaf3f132620f4e77b4f2287128cdeb3e8f1ec0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e16f2bfbf54fb42da5618ac2a731327
SHA118595722a91d90968c95517a6eaea8677d0a7f66
SHA2566eadb37037859b7b6a4f127ad7a40b9572e847b315f0384a8686cbd2611e4239
SHA5126e607a6fe718e1b199b08bcdbe468ecc5029e6005b063c4f2cf1e7e5eb5adfb958a99e4e5b37f8d6b99b07d0acdaf54262b807f98a8a0410b4aef3701223145d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9d3105350929ef3319397defd50a45c
SHA15886c90f1d905252715c426c9cc199cdd1590256
SHA25641ad90ab4a791828e43a895b077e24cfac993fc8e6e9c48e8cbe25f370482c3d
SHA5128f4485b76eb703f9c34dc08e290c03eafbdb76565747fa14fb92a9be47a1589356acb05c6242910f796c3a8334e0f65b0550c0fcc0343c9aca0058152e8f2172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5464da9fe90c06549d6cb8d0fcd983a36
SHA169c80f63445c539328af75ba2f2ae22b5f8e2b1a
SHA256dd854a939a3403bf17baaad8fb1237347b6e9ef57f526dcc8907330b1e19395d
SHA512c08f6aa2405de535031666f2b1f9ed05d03c1211cc23c5c05c4a9d77e64acf0f81528bc332ebec6be0c2dc5d48e87dc9f674e99551821bce14cf91e0b4d42a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4c0dc1efaa93c57ea958154c21f84ff
SHA1926947a8a21382c3430f7e6b7ab5ed6bcec762ce
SHA2569a1b7e775df8d2542094da3539156d8bbf470bb1260d77fe3d34a582133e9d67
SHA51232682128bb9a2f27217194d278335913d8ddbfdf9d70d25266a678c2b9e4cb4d0fbcf873ffa884af332e074c01e1d3efeecd7357623637259ba67b813ab90f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51014a4d14badb7d1c09555d2e3ada354
SHA1d3d6d50e3b414ba1aec2b49dcc54207ded240a97
SHA256dfb02cdab43e75d37db40804ddbfad25500fd37020909dff8040fab4e34a8d59
SHA51230ab6bb94fd947b09573a4d6a1155b6ac5c776c0a56b39753fa6ca812854c1e59fef2bba4fdb9e833f35aa0a463bd0c946b7c220e2214ca9648569055ab4b471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2f7b988fc6ecfa2e9d0bf872047c05d
SHA1aa6acda5ace800dec033b06858f02be41f2545f2
SHA25652a686f06cd61c1db84da37e8c7093b13228de0d42616d7c52c381f52acd1829
SHA5128303c353c3b3ce37d0999de52c45c4733be25ba31123d7f8bbdbb08fe960bed239b98f77fc91517edda4314e53d1437c2290620096276f8648889702cb30a2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565f9baaccc4cf72dcaeab019ada0280a
SHA10c703a23e9d76ead76c80f5a31781ebead733680
SHA256a33348ac69438f217eecb055b4df3a201a81b953b0cf64d75375c109c468575d
SHA51255ffbd0b8fe071af40d7fc0f87df363d43b551440be701e7d1b62ce248119e9d64c17096bf999820b60457bbd4992f98d696315926d64cd93fd954fec615911e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554329db9b338fea4dd8012364d1bdcf7
SHA1dee58a6ac67fb9cf2be8bd438c4e9596aa242656
SHA2561a2096a2d47d8352b4dd6e01ff1d8e6e5b740665100c3f59dc483f90ecc3456d
SHA512b08a600f5fdd9cd2ce192acdc87f4afd00d9794711d9cbd237e995c11a7ce74b0b6e800c67cc8ca7c28b257d8eedf45d55cac308c4e26becc9c7e2f30ba2debc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dabb1a074ae3b8254806e8f358971620
SHA14caa0271d754b305d08c8b9bdf878c0b8be5833f
SHA256b5e99d30b7be4bdc2a417eb26226f5173bed16134dc9d68df867f7067ec73163
SHA512b4f6cb0e88419cd033f9307bec0da5a5b6a88ec77f9e70fa2068ed62df23d03dc4ce550ef06c9caf18db296737cc7cfb3af9e03425e8ba32294eab8707f582be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53692666a39afbd1ca7f07033f8553051
SHA1d9d6d8797203ce60c18d4ba0efec200ddebb85b6
SHA256c1304404f244ff79f0fc6c9af1d47bb62a9243961fd3517de3f8eaa8c9369903
SHA51227a470e029242252a58ec00dbe9e2be8248054bff1d7545cd8aac9355de766d262b8f4249601abc0a1f5e9e917de293632855e030d50bafc2984c41269b9570c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5855c2e9cdff6b81e1ca9779822436a81
SHA1eb1a32dd50528a7fbfc165e6bf1369649c1f1ae9
SHA256027de8bf1f4ab06ac919b3d7b90fe8571c52f1000651605210dc21e32d431f43
SHA512991c6ee31c13c2c3834fbfbf1b7162d5b998d5ae257997d58ba3064d41ac826ce57e4c2c55b7d56f010463147abb9e262320c571ab864b6c277d2f67fe236dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f73237c3f9a330d1a207bed23ca2d95
SHA1cc5253df34747cbd0a65ef6ebffcc8016602a2d3
SHA256a8aabf1eb9464209c2f77d517e9ae356e523bccffc26a979a549ef14fa1c2d3f
SHA512e7d926879a09d2fc5adfd33f59b93e1e7b75b32a9b9a5fba2efcf8b2d37e9db7911850bfc721746cffb7044a852bf60f4a7ba8ad7a21f41f53cc5d38aea1f77c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdaf8494a46c08649d60d9a46cb730e9
SHA1912923f7418f091f5397571a82471e42bd89bd32
SHA256e58ae781e4df979dfb6ef9880fcd7fa8f5cf747a94a20ac3640e56f68ae70d7e
SHA512cd6f02b6ffe1d47e36a7af4adb4d091df0825760da8aa9231908eabdaabb83dfffc2014771625e15f345fba057947989c38fb7bc1d519ea28295ccb84628cafc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b