Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
f5937610b6c6063b2e6fb9351c128884_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5937610b6c6063b2e6fb9351c128884_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5937610b6c6063b2e6fb9351c128884_JaffaCakes118.html
-
Size
53KB
-
MD5
f5937610b6c6063b2e6fb9351c128884
-
SHA1
624a21ef23bcdc9d72c6253211dbcef123c8bc44
-
SHA256
45348db4372c9b2bf31c6e6a7796fbed6b502ec6cfd46bd0dce7533235191b2a
-
SHA512
5f0fc32917344a8b3b8c6d5a05f79f684523be0a165808310f0f87aad5f36ee2ba5a66c43f3901f721bc095490fc2edfa38c0c0d60cd018ae94dcfbc1b0715e5
-
SSDEEP
768:KAayHHvPWloFtPd5/PH+ZSb3bV3bvuyk/pQbPHXNaKDXEkZ5DpsJ:73HH2latPdZH+ZSrXbPHXFEC5O
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4BCFB071-7B16-11EF-9EA5-F2BBDB1F0DCB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433413984" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2320 2356 iexplore.exe 30 PID 2356 wrote to memory of 2320 2356 iexplore.exe 30 PID 2356 wrote to memory of 2320 2356 iexplore.exe 30 PID 2356 wrote to memory of 2320 2356 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5937610b6c6063b2e6fb9351c128884_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5f4f2db54d9a61a3996353e4dc781c7ab
SHA1695c6a5f5b12827756f3cf3f87742c989f875ff2
SHA25629bb22e77d832d5fd2589fb61cdb505d2578fa9b78d8e4cee366055a97c84037
SHA512de1b3e6d11448c0c4e9ae0b9e1c6a7615e2ff9af0e0e514d88496b09b5fe099c1c3e807c2f2cff8d90095d268e4f9c98838772ba2123920491bf92c2b6345218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_0BE30C8E6128C0BC8455FF6A9904D7CF
Filesize471B
MD5eaf63c07313fac947c1cf0542c0119cb
SHA1de960238447bb7651f347ebde4a8944bf5dc56e4
SHA256147778df5d770661b50e95be061fb3b1b7544d098fcd39b15b99244f7d8cfe26
SHA512ba5a14bc872ab493e9780cb398ea2cf663ae2f477c3fe9a1ffe739351cefd4c374000f3ebd976abdb86ccf865fb6505d58196bd9bfd7c8164f8e5a4749441894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5265609f875389a03cee6c00be59c787e
SHA1ca001ef9da3b1217316d2d2cd7d9e330ad4197f4
SHA256d0920aa984a20a7cb107e21115a733bb997af647d1a4ae00fd9da22355875635
SHA51216458594d369213d9e6ef86985fc0ecec08d38c71f380f6392d815af0be2a4874d99e7952c14f3fae4804b18b78a2d682ea7040656f14547d96fa7a19052b28e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD55fa5b84c2b71290464ef97ad87e191f3
SHA18a5af3dafeba336b6f2e3d85a9fb3f0649d4cccb
SHA2560454cdb62d371b46e85848d259ac3720d5fb7f5f1d8f624bbeb16f2ff8bc9df4
SHA512faa3558908eede99adede76da544561d43467bef54755f1f13b4933d8cc7e56f4da0dd899a2f50ec85c56ce229956e3a117e699dba8280bf9d03fa58b04354e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5f59ff98af036ffceda86fa81875e9ce1
SHA1a3ead3503ff68c91c1551716fad0bc9c384e7d71
SHA256ad24cb5305c3d47d0eff6ce89c40646bf3f7823ec181bd56e0b3c490f3642b65
SHA51240d8f61f4ef655e95e3d5efc5cc432e1c99fa83ee8401f77c7ff18d13c111e0749bb32eb1577070d630b4fd675a46f369e9027373184caca6fefd04348e88439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b648b704f927ca13c6e3ab76a85388
SHA19b4fcf08b46f246940db7614508bc45a39bf7250
SHA256afde6a73e5e96f8a055167758b6e5d536a85daeaa93d7608996eae8e7fc1d2be
SHA51298a8da169a52b478bf843e80389c3d442034f9886913eb652eca0dbb51b9b7a06f7eccdb07a2e93f69e35e5d14297cca634a60e1c4c24759c9ec563037948733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54578ea8f1b4c6879ef511e41acd61a95
SHA1d20f1f0d1f1196b30937c2bef723c27c9421955b
SHA256d08aa07ee54cb7b352928b277d82a58a29d66592b9921dce9090ba695085158d
SHA5121c707687d7d1bdceb09f52d2953f71c46af448874df10aa04ac34c4a941d4315cd2d2e0e6f26e20316425c027c4d8a5dfa4c187b14c6f65687e02815e7b7d629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54851e066ca3c3a3506632bb992b635da
SHA1557f83a009df98d4a63e2fb71ec338ed6f882d2d
SHA25614fd0946d361900598ae7ec716e36ee80d756ab466d3b4ca0a65e39e766887a3
SHA5125d5411f1f089792bba1951e6ac5feab8fab9b24c7c91cb180b3d5512dc732ff2e9698e25f723a87e4522b8ad62ef00dab76540a3acb06cee5eaac8c863e87216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1f793162a81699b812a590bca71a5ca
SHA1fd699f217fcc3855447f8a56e83683b34f75a8a4
SHA256fa8b26f79795947f3adee60c9249093dffe55548ca6fb0ae83d1383dadc051ba
SHA5121091986c8be25a79b8d4847ef0953e31048d4e62b8e9578f76ac20a957c0596a89204ea2bc9b039023a6d625ce3ac90b0d34bfb0ef4dba97c7b2b58e2d956079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5757ba1e393fbda7fe82ff318b115a785
SHA1b1fac4e7501e56475b97cd5c112cde85ae2b22a6
SHA2564e0911cc7a7645a11b7b9202976727b7d95be01e577db0d9f6fbed742c85fae1
SHA51281254b3dcdaf9b62ee2ba6e222428ab635e7345c22019c0585a8632f4d08fe1932820e47d69533bf5da85b707bf18d9fd165c123e17bed12a6366d28b1299adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c54bd78e5f84b60ba6d1c84a476429ba
SHA19cf1c2e8399d8cc6f39d92f9ee4da699ceddd0bd
SHA2568a01a24c1c8b688c802fd21c147f55945ddcdfff103b709c444a27e87e9142a9
SHA512161ee94d1265598241a6f7a5d47acd597dfb84aed1205e6ba6e7c941d70d656a2f7086f00892dab2855b55645b16912d0d0737a464a33dedb81bfd163fdb5b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6726f03ec42b8116eb636727178adc3
SHA198f39655ff9af62e69a0ed85fa827a56233d6735
SHA2566f7177f587d316480808dd31a49c6374e08a9af70289f56f4d24bda9f05a6ba7
SHA51211da35f1bc5536008675a2752981a62e91b80e06ca5e17787979c898ea01a738737879cde7a0fb224d11a45cdaa10cb88fddcaf03d1d5de19fef563f876a3489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5278509f0a95f467fae9adf85502e2b06
SHA149eb77a44b64491d55ea846244487f4bac0d2a50
SHA256da38a428ac98600d11b4e55976ab98f1447c495cb27e0bf36f4e59861de30d95
SHA5121cbce172a4a409e2109c8a30387686757fce4a7b29f070659767bdb0adb7fdc8405ea6b2481a6c74f75cefd76db54121e6d75496324f8934c8cc7922e7bc4ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518061aad44db8b4a39383ee387498fa4
SHA101281e8d18e1fda3a4f523eff46551d2b56eb207
SHA2562c06d4ebf195eb04303cd6502e7fc841371d3a9b500f813a2242b9e3f5048e10
SHA512f1aa72044a0fc6513e9ad757c3e77fd14a1e0bbf4b6fa87f86056c5c725fbf20a47c13894ea7766eb90c8ddd5f2e6f8e0039bb528de07eaa0015e2d603f7f986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fe9959ddaca11972c73fd939477554b
SHA1d93b04d64a1562b5bead5caa1a8f9b894d7c3b69
SHA256e81d6f7ddbbec1a22cb8d22aa3753ecd38a9cd09df1557a0f1e6fbd5f5ce4ce9
SHA512ae6063bd13dd5a87c3b21da5aa5fcdfd41099aa71e58aedb0cf88c8be5a792232c60399e99aa593041b513bddd7fe33f83219e3e52e2f07dde2687def5a68a4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eb2cff0bdebdeeccd0bc3115f48d3cb
SHA19950a42aa248a0db0ec75b807450086c7af82435
SHA256095f9185a0647a2676b4fb90fd230db2ee3b7acefc39568816c60c26122c242e
SHA51281081e1e0e8e9483e1c36ed9a10df6acfc9f81d0ef35ce38623bcd8d2f95df5a8e26c9abe16a5a97c4632c158e454716481a618cdd6a196b7a15e95272f820e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f761273f1a22ee038c5b3b8d16bb966
SHA123d5541c92aa38d362c08de651eca7d06e9e06c0
SHA256dd326c86c3f3868d7f8daa100e5d4834e634291e10649007683947337e0bfebb
SHA512e3a907a48a47135dbb0916e6e8a598e1c22dc681f5a5079cf1d1f1e1f2a28e4a24281f76e751c4b3c0acbc4099bfff2094f69f0f3ab709ab26fca00e143c30e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fd5613b7f6c6cd023b4b59e9ec04b5e
SHA139135608eef81b5a93f0c584719c2aeccc3b7813
SHA25641b5ec18eb3581130da73987c72b12210cc170da540e74b9c44b9d398eaa95f5
SHA512cb51a30ba9a81076b65bd37a37988f297641db77eb5b94016f8f8d86a5377fda2e034c3f23fcb8c10d05b21d0142dde62637b885dcceb13a4ed2356e8919939a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599175c495a020a5d55ad9f490a911078
SHA1946f989fab9065fab60471ec611113c241527e7a
SHA256476f55c191dd12678bacce3a136cb4af16aeedb253afe6bccf093ca76498645c
SHA5122fbd59b3d3ed30ce6ac354a701e42cf50a4719357b7d211e86f2f593f6c96919edbc60207be0ca10da6522d7ab2c05f089fb67f4df7e9258b0e4a2267ede093b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56109e5f25b11ed18f0ec4354d2116546
SHA130fdbbd10e1c2418ad217806304eea701d15b9ac
SHA2568dc9085c514e0f06cf6166a01d6871d0eaa329fff7f73e1ce1412c4a4c72be7e
SHA512c41a58ca3af5bb0cd32c9617c66ddc3cabab2641bdd8a40ed0be8020675be9f29967449adea7b0e7b8bc550c71753db77d1ff5e416c304bbd940d58541cb3e04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5443023cd2e52048394111b6355b136c9
SHA11b086bc0bc1f68e695c19bda28094a747832926b
SHA256c1654e4d336f0d8f5b87401bf90d6dfa1cdacf1703ab999f65785b121155bbe0
SHA512f53381a24eac84abf68560dc60c8026ab4bebb5a78fa7fbf3522c8ef78fad7598d26816bb6b816e1411c8169673d4ae695e2b67e6cd41ff28778dbcbb8baea51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_0BE30C8E6128C0BC8455FF6A9904D7CF
Filesize406B
MD59fa5f3ac44e8ab2608658fad757dbda9
SHA16b665c3c2365f44ba25040a4408832f2ded34bfc
SHA256b3c688734613d3cb4add23e74c313dd2837b11decc5b44b3b6784076125c74a9
SHA512cb0c283bfe7bd102d2978da3de861bf721aff4af51441952d3388ac04cf212275ec392fbde2e3e252facd2d903252394948bfd9f904db81f90adcc73e08c42cc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPUI9R2R\plusone[1].js
Filesize62KB
MD52b72da5279576c62e6e3bcdadcfb86af
SHA193255909ac2892a54fcbb2a4445ec1aff46cac55
SHA2564243c6d726cd3e7056a4ee7efe04d9eb84ee713bae54f0374d6f8d71d0822481
SHA51251954e78603f08d4eadcfb58593624100eb8ecff1bf3f7cf4c6c43b5cdb317daec90e6919a71f12e850f424e8ec7e0bf51a9c782beb5a3b7ca6a8c604a522872
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b