Analysis
-
max time kernel
70s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
e0afd4dc1a5056ca2ee31faa8f3c0741_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0afd4dc1a5056ca2ee31faa8f3c0741_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e0afd4dc1a5056ca2ee31faa8f3c0741_JaffaCakes118.html
-
Size
140KB
-
MD5
e0afd4dc1a5056ca2ee31faa8f3c0741
-
SHA1
c0cfe6c56789ac81925e796bf5786b112d26f817
-
SHA256
65a6b9b9f04699ed2457a3a43bebf638ba999f90680c640b3a70f2dd09d5fe74
-
SHA512
2ddfb8632fa47a74d72dbb800be9c9dcdbff4ab901a1be05cd3334a6a59602ace9d12accdbf72747fd8b755a824d18dfee5afd04fd7b5cd84123375f6c9c97b6
-
SSDEEP
3072:SJdTlQVcKyyfkMY+BES09JXAnyrZalI+YQ:SJR26OsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b03563c5cc06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000030770ad3240ea522fee1cff16e024d70d2888378cd4b78e20b9e57133eca57b7000000000e8000000002000020000000c7dad3be5eef03ca1594909f2f3e7c1a9d18be6acc452b64fadb8a67b0f4826d200000009c00f7ba8c5a2e86096e9688a7f8f91813c6bd8f9e73da0f7e6a39594c474b1540000000971f448db5dfe337682cc753f639e83833b9c5de3be0a179cf6098a1ca56276f03b3cf43d3d99ec85d4d533784e00cce8dabb06e4e1fe49779ab59655a659590 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432497286" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EFF6A731-72BF-11EF-B2A2-C6DA928D33CD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2376 iexplore.exe 2376 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2704 2376 iexplore.exe 29 PID 2376 wrote to memory of 2704 2376 iexplore.exe 29 PID 2376 wrote to memory of 2704 2376 iexplore.exe 29 PID 2376 wrote to memory of 2704 2376 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0afd4dc1a5056ca2ee31faa8f3c0741_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521ae72dc444338dfdc270d500fdd7df4
SHA14095c97bf71e896772cd81b88075f7322ef23cd1
SHA256d87e77153d6d3db584bd89adab6d16bc0ec9efc5b45ad458c20fc98774dc865e
SHA512a8a3c17ad2a509af580a2c6c42c279e41acd2e10a2fa25bd68c403d47a3148121a50fe957620a6b89fe367235d457061cb10b24f4f86fd10283c3431c441ba48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5563a2e0cef04426d5ce45ecf0f6c8b29
SHA110bb6821f2b4c7313db2541cd240ebaff3ed347e
SHA256db89919d4d2b8be33576dd3e981c049ace81f28c77e85a5630214bfbb2e90c50
SHA512568705585239b09767c900cbb81b3a1f0f265477a12fa04b5151e567a5fe90fb77c4a1e28feddaa8e28f12db681f835124dca592c95173bc9df473bed4de59d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513eed4f0d87044f91d109bcf2fee3b46
SHA11533829ebf017dc7709ffaf0eee4ba79a4f193d1
SHA25613a57b15b85d26c10f6876c6357d2a53a96f00146025008e15b997a796e4b43b
SHA512e177719f2af32cfe7d64df84a0eb11371dc422165110913b54de2196f177412034dcd4442f4fa198dd139f44230184a0a7fd35aacac76c56aead65a6269a42b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a364067090844724ac91ee57b28a2d79
SHA187ecbeecf44392add4f09374c5bfe07e56660b87
SHA256032cbf9f005d43089d85828f8655b496649114720cc0e326a4cbf21da048289a
SHA512f4a51e82bb6bec641b9f8138d81d7c6cb6b382679095b6a08bcd7eccc83caa0a3b8af7cee4130d505487a88022809683e91ca4e0dba9bb87abfc1bdc4ad2edbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5449d40d9be5ed7bc06ffee21ce0c6fbd
SHA1d6570abb63f1a497a19313996f81e4a6a1aabe62
SHA256de20e7b4b1af9361a69387071c646838ca2e698f60e6be96724c1e2ad7e89975
SHA512b83e9397286ff57f5000e63495cea2e0a6f4a357c12764bcb00bdb7ee7d40053deedaeab22bb8036c5e6da9b96758f9960c49468fa9d67a56bbe44c347d23d50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a647189aba2070015d51b5a5d33adb72
SHA1e2742543e9251fc1b1231b6314bed73f9a6e3184
SHA256bd021cc6efec7152b8d3b27f8d6dac28396abb5267d4d938c7fff920762ca884
SHA5126b2e719090a2b160762378f0379a64388d748971bbdf8699fa2313c285229f15e789e1286262dad482a22a9b9ed1cad2f3dad45623f3e7b976bd172881a9a95b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534fb8851d981046d17d2ccdbbb5ef1a0
SHA160374e50d49667604f5e870d8b5ea93be23b18e5
SHA2561888e4a54767bafa7567ec7b3b974881ba860197aea4c8d4c49eb43687167702
SHA5125c31a9ae334ea2a9e61334a8dcd55c87e99bfecb9f557926dc1b9da5430aa0ab37aadfa9889ba56392dcbcf76d25868633862a51b606270c083ab31e39313ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f241eca7de86859dfe845b595a0c493a
SHA1a0ff3ea26f31976aeda75c5ca5f2e894c5f0d655
SHA256835b041f42d85648148bd2635cc380a4feece4e6fa50dc1de6388cc485eb6d4f
SHA51265a807b478c132f404d818e283ad014f1c990d20158aa14df20cf98be55e5599e396b5e0156e5561e6df6f1c4ea9da7bb9592e67935a30653832c97997dbf88c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f1f832a1fbd929c9cac73164beb9a07
SHA1fa71e544fe7688c6425fa957390808560c8f9884
SHA256619351ca1e96840be8ce9a5967d181a42df0e688af3202ed39cfebdc2965c3da
SHA5122cb9f7dcd63bff4cf8c8a546a354d45910763e1b88f520d837b4449e8a8f0c01a9c553f59e27365c2af98acf5238cacdc87be1207271f9f8644c7ed2ddb71985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8f49a2f352b9b137bed7f0578c3e66d
SHA1f6b9554b3d49fce5f7ed7cb09ca3d72b3b89b4df
SHA256aa273f38322cc5e7ccaffe4124f7fcaf9ad65812dad4b66bae524c9d4e30a6bb
SHA51253c73a354a07e72967d0d083a07c02d688151ea2e8cdf7e28adfbcf1a37293e8bac7c2f2fc468fd4a02f898898cae6c09dd8cb01406b87d9a9640706b2abc731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5404251efb917563a541efdf0e866d3cb
SHA17b7a6753340c7ef3b262c0d77b6f6073c4ef8f38
SHA256518515d54a28f6db27764932cf0baf3caa540a6d73ccf3ad92251f3d01855fe4
SHA5120ec21449d3f0df1cd0cb7cad99c3101a57607c02c8543a94204301dd3cc1a5bb67a065d206146700c1e5eff32aefa24d0f9699cc8c73517e08371eb7391f2258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdb9e56f665c06bde6bf5b2d5d2a12bd
SHA1603f405cea4fac079946dc7dbe1cf8af03dd4161
SHA2564e632f3016a8d247261367e4bbeeb37cd338fec6ac8c1db7f5fd23c183ce8c35
SHA512ba205c8bf50dde9e29a70d7871ac28fc1bb263a599b0d27ede61660ba687e2cf4e9897c0e9b12029f20f1ffb66c42cabf3c489e546ca26a714e0d9d0257dbdbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1ffe2b78451a2fdfa575992e287564c
SHA1ff4320b34cf613bf0d0fd12c6f4f9887d861f024
SHA2564b1d9bff6462b3201aae12b60f3930b8c8c3a37e998c452400b7f99412477315
SHA51219232bb906327a93eb5277d23d460710e5908997a6c9a8c2bcc276c3518d1a662aa56c0ae382538aeeb2455ca8149da54aa10c4e8a6859e70fdc9feb83bf3cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b59e4190fb6296f215b10439d262751
SHA1a600fface9c697a0694d1184b86794bf77c9d068
SHA256eff3700bdacd7b11adf2c805251c9bfe2e61ebbf7369909b971125b4e4f07a30
SHA512d94cfd4770401e0e4bb12d9f2ffed452d9d68458f391467ec269b16004ce7f28e4b960d30151ba54213dd354d6c117e00636609db8c68c8134b61e9d646c095a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d558bb8a4fe276818c3657bf4e03a55
SHA1989bd49111eb261fc910b1fd231a4d9843890dd3
SHA256c0bd73ef9a6d5c38f9510026ec4652c5d54670b46053fbf342876bd41c7eb610
SHA512f8419558879ca09c04474b75a96da20e5f1f349a70ae4664352afd64426db5ee7c0bc1714b3cdf30d16540e6654b50beb98ba9291f016225b035feb6fe090209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586246bbff188b5e2f99e122947784b93
SHA1d47abb8414a611b5ee9f4f76f65070d94eb6492e
SHA2567a80c62c1a5f8ad4353fb3e39a0db535a986b9d79be7a483059a50338bb3d3ce
SHA5120bf0fa7a92705c5bb68efd2d54474a32475854229eaa36188a5f933be87c2ee024c31dcaff655d9e2df5353a74d64955e1b89ab6403b2abf63640d250b3e9b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582522e8584d38380051621fe05a0cda7
SHA1d95fad148d75b82a640502e7f453f618042973ac
SHA2560efdb860c57d9b0fa96f9de9c0bd8dd9f281f2d9e517e8bf5330222ecb15baab
SHA51224324bec69502d0ff484c189b98a9ad374ca199ea52de36a19beecee0846e97700dc4732a12d1d1ee465ac7869d450bed6050b2602c62225c3901b3afa480622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5482584ba5082b7e2a4dd652f4d3f5197
SHA11d3430b28d08f64b09b47bb661ab00eedf214d40
SHA256e623c5213c13e6607817c834305d96cc8ccf66062779dd8cfe3ed37a4e4480e6
SHA512c2c01723b7c1f11c24540bb847cefc9512cd72143f8b92e0db4928ac73bb61edf9e41affc004869857ac8c8b4f710b2773cb9d2786e5b981326ba8fe3e21716b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5796df047b524af937b15531fa4524376
SHA15ef31492cccd5966cde6fba1e53a412cc0ac5a55
SHA2565da06c4616b6596b56ac1f0b54ddd0ea65f9ac475416fe7ac51ece093659114a
SHA5125efe29cd5cbc11a89d3d6833fbfc771af0df740ac8b399d97a4be802bd4033449a1734aae5ea7e6b0461e40985099cc16cf720e99e2d0236df51bdd53e87b9b1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b