Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 16:16
Static task
static1
Behavioral task
behavioral1
Sample
e08e68343c259520c04a6b89a5db867b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e08e68343c259520c04a6b89a5db867b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e08e68343c259520c04a6b89a5db867b_JaffaCakes118.html
-
Size
213KB
-
MD5
e08e68343c259520c04a6b89a5db867b
-
SHA1
5614432d6a1de49fc664d1c25ffd55c4ec464afd
-
SHA256
e869b27021daf6b4dc56a3c995941210cb29391f6ae34b082f153e8cf1f8adb8
-
SHA512
9623d1a985e072fe830be0e5dd93bf285d4427e7a320ff742831d109a35d5a979e2260668e297025ae96e834f76b545a94734f469ca9e7e3f0f9cf1c52d55abb
-
SSDEEP
3072:ArhB9CyHxX7Be7iAvtLPbAwuBNKifXTJy:Yz9VxLY7iAVLTBQJly
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000c7a0e643e689b2b808f0b16ef300a03ee8ba681d94e20cbd01ecacfa6e3d7ceb000000000e80000000020000200000006150c8e667ada28c30b3381a7baaef85af77e62a79cd8c68b04b273f820a27cd200000000f9fca426bba1db944e2ede176dff1c1fbb2af7052745ba65d65d0b358ac409440000000c1113f08c8ddcedd6eb2d8ead62958cd413f4c2212f84a13aaf02a958ddb9295f932ef32d2dd262b1d3926d96cd0a211574c68920bf9795191eb36d1d15aede9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432492477" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90fbf993c106db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF6F4191-72B4-11EF-A540-C28ADB222BBA} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1096 iexplore.exe 1096 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1096 wrote to memory of 2940 1096 iexplore.exe 30 PID 1096 wrote to memory of 2940 1096 iexplore.exe 30 PID 1096 wrote to memory of 2940 1096 iexplore.exe 30 PID 1096 wrote to memory of 2940 1096 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e08e68343c259520c04a6b89a5db867b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52044027f20f75fda955440f0715c9f5a
SHA1c4cb87a55f01493e1837bd39eeb8deca8962e8c9
SHA2567392cd8c57741893b8f733d996e45f50b1712084e12a043e8b0515446a598fe0
SHA512fa092a3dd576557357ce2cd757fce90031532acfe3592de20729ec786c7acef852386bb3e8ddb6ffae173adeb154daf3422a7d81100dcd2060e45b772139feff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a57f493fa7eda351b90de275f61a715e
SHA1b81c0e98080d9fe2af7ed820013586b4aebd30b5
SHA256ec557bf02c8d2b1b8fdfce4441037e1a26d782fbbd4f1f58882350b77ece2922
SHA512d8b0106a935851208b331d7c4d8f3b9911617a2ec794215b34f4d2898c948a973f40015f5837e26bd1f90a5d5afff70868456b61141d5a11aae7c81acfb7d68a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500e0f8a3dd812236f065b7658673ba47
SHA1f7058200493aaa253eb7aef91224e3ab44408072
SHA256b9420f63f19dc6d1a5e1278032de9181a34133eb4dc90c09a0fb6060cac35817
SHA512d041fd84d62dc20b932dc2d1f556d7eec1db6fefd2ffcacfadc38c60eb1b583e2be333bbe6d5ed446f319b8c644c84f0fcf366d0a51cc5a19e75b64f095602c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bda097fec07c77cd7e10e769fe05328
SHA1ee813daf57829ef3d414446342090f7bab924afd
SHA2563bc793766c16233f73064c6d4c8f2da90246076b5fb34479669fc54dcd1c433d
SHA5121208c68ec08713cb0eba3aeb215e894693f2b04d195c5e5edc2ce79484d6109498ca80946246e2069d86144f3f5d4141a77849e85b7e85357c15aeb48f10b62f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5063d162a02764c68fc54cbb7720b0229
SHA1c638e2b5ec594cc6afc4adb38b4b3affdc7c7953
SHA2563db3a1b53aeadc674b73329deb67a4633743c7419ea301ac3d61daf6cf41e6b3
SHA512a445bef3f2cd45e76e7c00a84586bdce301946f72edf4cbf51dc3ad49d8695b3be385e89a6dc0b2eb89eca51e2354dc058412d597f324c5d7de7807d2eceadc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff16c13fe6607685a6a2e3f3f07cf702
SHA1c1eea72fe74a6e100f38023feab673386468e260
SHA25660a8d164ad1b1816dc0dd117768e1146ff1b42b1b2c19ef26c769d2d2ef144f4
SHA51206d3c449992a4e61bd3c448ef3b2580e03d87f0cf7139b7186f64926e5bb2fec84799c6b0cfd03eac6e78f0db4215de525c411d513b3811e36ad305dd2fdbe5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c480f617b53551e6361f9a7c308258d3
SHA16de53a45c4349e9bf608d67fc837420488fe9d23
SHA256f775b13307316cd5753450a16c041854bb6e4ef91fcb58a2902167bdc4ba8bc3
SHA512c1d1f85c9d3ea63c4ee7aadab6eea6d5c95c07caed0673da4f2925affe41938cacc7a4692a71459ffa5577c3c0bd0ab7d7cece7867e57ce31d5a7c6ceb26f45e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c3f6d3289105d9180435373e64e82f
SHA129088158b5b2cc355ccf50730db56c29eb85c575
SHA25652366f1de8ef737876bb33d524597ae94fbe79609db2a521b296db28099ef8a7
SHA5122beae6a760669e6e9a48b39cc0f560ef3b74d155113a83662abb561d85e532d3e7685f3658a0524ec28736b964a1972f953eede52620446bb132b5a4ff5ad584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5329da92da1b2f7a6bae78d3ccc06238b
SHA12cfb65c015390aea17b84477a8c3490cde1579d7
SHA256d555da2b9de70645bb2269765c9e988a2657a6c470bc0eecdc3c64c55c313169
SHA51215c7c9944fde20e96d22a13c720038b95875cb2b2ad13bc4c0db85fb0c49af6cf875847d58285a17d6182e84208a42714969cc4aeda27a75abbc355e683ce261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3e32223ae5038ae4029e3f50ced1a1a
SHA1707ca9bcb2fce700381cd677dcbb5d7579ea728a
SHA256aed1dd88f79c0e5701c2d6b6c7f2067413df80107f10e46061049b8d915beabb
SHA51280987e9e5c67f570ecc51a415892edd43d43d7e41aeb1bcadacedc4a4a8d88726b6338357fedaf9e6249855cf46b3049180c59f3b300a9f201e3d1096d90a675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b13a6443f74409b3bb862d04c2fffb0
SHA14452470d8d33b0436e0657c1dff0eed2f39f0eb0
SHA2569a73c24196ed5c10f132729e45b8046b0ad721c4a843864381e0d00b1bfe8b30
SHA512bd8f4788bc1c7c15c309dad1c8901515e79b3f4da2651ce2ab30981a29c8e719465a7043ceefd5c2f2da3a6619d8bfa23b334b65f996b0fdad224dd94a29c848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559194a8dc101769e22f2d2e3bd0fab3a
SHA1e56beb880bb32de14cf415092ba264b48641da83
SHA2567c211e59e684b9a0018a2041ffbca96033e803d2cddec642ed7279892dd15486
SHA512ad9d2c8ae2f2f17f237ff87472b5231d0964088b4dc7c7cfcc1f5d2a92a077556dd65948907e8f982fe960e3810591ad5bceaa97a34a705e3b5c731abc94ded6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eb79733c4b4d741f700d2196c0c181c
SHA1a97bbe9bd4bb91c66f8279acc9294a72e69735db
SHA256f17126fadcad13e9972db460efb47651b9d026ef19191253c1b5d14781370922
SHA512cbd18f838e0eedb91ff0d42768f82d1e9cfa5df8b58378d44ae09b3c9e5d6c2008fb373f1ef5746bea6b6b5b8544295810a7d41cafe697bdd8341c26e588c0de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d60210bb349579a1325b062f8ccb8752
SHA12845c19802629ea660fd6b2cf27379fea9fd9131
SHA2566fd326ea232040270c4d169cd776bb0db213b1afaf670f5eac1223a2f68046e1
SHA5125cd0a73ff93dbb06865d81ce8709f3a9fa33c44ea1bd393720358d95c76888441ba3820506f2717f81777253c02f84e9e09bde854e50956a8ab554bec32b3a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d31a734819e7a183743f5bc4c34251f
SHA1f80fe618f84ac944e67703ee4bbb89312c5bb204
SHA256cf5c857f972fb1045fa82357fa83c7dc34c225bae0c8e4be00e87fbf536a0023
SHA512b2ba0f397fde0388574a14c2b7a2d9769383c26bf63ab0a1db7165f6c84cd775476429f1a1e55e52cbf6bea7e53bbfdef676ed2d8c4f27cf6e267ae17c7a1568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b0755d39527768bf9dfe273f247e525
SHA138620fe97f5facb629e3a9c2827af88e4495d95e
SHA256e3d46b3c03e81aceca670628ff02210ea0b9080acf2dda6fd74b29307a00ca35
SHA512b256beddbf39c9ba82a58a03cddfa8da627a81d6cb5214163601a395fd718f3759cbdb7cdbdbff9bf955cc0065aa84d7071ffcd678aa5c5f4a21adebae1facaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c0b434e14d4d21d57a4a0f101a7aa9
SHA1f35bb4f74cdc5f1d0948c447a988c87a59a6134a
SHA25676f623618a82de9b7a9d038cc371c3e435497893cf07770419c8b0af79daeb23
SHA51260f3cb769cf0da0d5f5e9e197298a78d3378d13b3b21f98295152958b0b3b2a024ef8008f052443aefcd40c9ae73a150df1c8b2f0477535523cc6dc85075cc0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51604015aa487372ed5be98eecbeace88
SHA120e6b367eb16619c28ab438697741feef89c7e92
SHA256e26363b08a112c1e84ffcbb54d0d2967865866c6047a6df4c0a2dba705dc017d
SHA512395ba1b5a5c418bc2dcf277876335c163e3a7e6d02a7a2a5c1d551d1f4913219564469cb7e4ec2c26e207b463fe992d7a9a9ea24023d61eb49182893cd2575e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1bd09843e7c45fbec500b4f65de90da
SHA19b5c5f1a4ef54f478ac36870716fda1751d4b66a
SHA256de05e1c8f2519432ec5b4049f50a0f5202ca6e9d3756192502285874682ba561
SHA5124abf7be78d23d1cf8bc006296cc689ec6e197e27c9aecf28661c2162ce1513a288566a4fd858a7ceb0a469954cab7226fed2eeaf91f756576428a1a82fc4d519
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b