Analysis
-
max time kernel
144s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
faf8210067c28c906ea7365d3e511172_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
faf8210067c28c906ea7365d3e511172_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
faf8210067c28c906ea7365d3e511172_JaffaCakes118.html
-
Size
139KB
-
MD5
faf8210067c28c906ea7365d3e511172
-
SHA1
ef1601d9347007cbe9af8c0214eeb4953ca3b255
-
SHA256
90a3e673b3fc35474dc659f34a106956cfa18f129fc924710838e83acc107cfd
-
SHA512
c2651a45e2f2a9bb6e60d8d5400b59a2b4702edd4b5cbadd5592ed1a1c89a9893fca93f0ccf989110fde0ccaffe59ab811d146473dd485246fe934e90575ef22
-
SSDEEP
1536:SofV/eeoXNlY7fPdyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:SofUXgyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA120791-7D1A-11EF-943D-F245C6AC432F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000006c01a8f99eef8e96a613f568523cad0931a56bcf10eb29128f8244fab0162928000000000e8000000002000020000000bb0a4083ad223444e1f707325708023799d2904ac8104823ce44725fb1dd3e8920000000773d43779eb1b73a7eb475d3e699b9e0e0c5167810dd477f9f7b81dd41af994e40000000bf9a3e6c80821d58ea4cf1358bf8fe2444bd051452fc38cdb1a30919ca4573f2e761697a8fed2022fbdcb6426ce9229f18760ca7184b59813ef2d99f8ebb07ed iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60801f122811db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433635898" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2948 2712 iexplore.exe 30 PID 2712 wrote to memory of 2948 2712 iexplore.exe 30 PID 2712 wrote to memory of 2948 2712 iexplore.exe 30 PID 2712 wrote to memory of 2948 2712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\faf8210067c28c906ea7365d3e511172_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bb10b29e71f026d60c06f47ac420768
SHA1d6d424f36a699b7fc42b4821c2d34d6c3fcd77b0
SHA256b90dd8f229d409813ac847ff8976c25fa6a5989f5ebfda9306d207b5ac5be6cd
SHA512d41d0871f6ce3e583bf3519fded3184c0ea8673aaa3e12c58832a4e8632113f0713d7be42bc9ac98d3fa7342c1db6319cb08d87d25bf60c023ceb7e573251e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5029ff268818de6482b6fa0c413ddb109
SHA1269dd6231e46864f8197c177b243d6d52291dc7a
SHA256f5f5616778b9fcc2a8d3d23e5be0430b131c2c7e0fa4c20d91ed123bc5737de6
SHA512ec8f675a70b6649eebba86af4129ea2d642bd4f47f46d75abcdfa840fef241ae131381e662b69492c76fdb5c418a6514363c17006d404b0bdce5122c55848494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c3452ae48da3941b8ae03a61bbb501b
SHA1fc85e8f7feaf4199e08bf5273d03a4d03130f818
SHA256428fe2d1409025394d8728ad41833906e81b66d4881e98f4d55848039c98d9d1
SHA5122b87660e89e62256096e0c844d99a20e742cad1386164c0644177e3a4ab3eabb0cc0118c0a026f61c07527da29d2e615fda192e6d1464d9ffda1606d34515f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6141381a1ca1a801b7ca232324a2d39
SHA1fff1d600fe4ed0005487fbea9b0fbb96638f5810
SHA256fcccebc2e13f18378cf04f6e3268c2cc195be9851150526b3f9bd02b9c90f43b
SHA51211c0866830b2c2573d3dd2695bcc9d1122c817f661342c59ba3abdbce8c9c353702dca9f1a8a78f911eca46b6d99ab49a568f94a48e4bcff1d916ab8968b8e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514a1a687e65f0c06ecaa22325d2670a7
SHA16db8bb9518e2188ec48c1170e7d3f984d4e5eeed
SHA256ba466fb8cc3a4443fa18fdd2926981f2af4fab592bce1928aff8c3e8d98282b1
SHA512663f512520b9e9369de209dc921f53130e0708c4d6960edcbfb0244ee4a8f14b9e64ec8826bc49a46cc4f295f7ae592efc72b8fdc5c6c5f9398ae2f844273021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7c90f0e9afcae9876f222d9e20659f4
SHA17c9e119c303e079110426c9e418d96434c5633fb
SHA256613f86fecf8f6f3c0f1b8ea813fbeb8fbad070210be328ac4822ca062334570f
SHA512c1da56787c965ac8e5051ae13b8957512905405b2158b0cbe98c5f346f15cde8b46bed3b2265b8ae0cb5e94f7cd37b0b2729e3f98eedf7a384f600bc17ace011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525df7c5e9a93d79138da9af47cc3347a
SHA1e090798620fa2c2a8b7bb781ef48a35fd76941b5
SHA2569d98288e12ac8bb784ff81958d041dfcb195b37bb66744ba6e91733db76f55ef
SHA512942b6bfdbea856b6c82fa8fa2f9a9f7beea0f5d4a1efca3875c05af93fe7f005902631baf02ff0363b863bde127498a2d9164aac1138e89554e40b781ac7140c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a28339804d75417fe9e5f87e85d9357c
SHA15dd1a724876dd21d8548e2012a0bd2b24704f05e
SHA256ce58e726a32cb75667018c475a08a031c4e9724b29defa1d3e1e09be4edcf030
SHA5122a74ec8c0fd9e0dbc76323481197c8f28ac5a98f72b112d557b85cdf79b9aa59b5ad68ccc678705082d456960d44940cba4ad97fbda5738c8fd9a2898697f146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c28112cb1c619ebfdc3f3191639e5306
SHA198a9c9b1bb653884762ca2ab1d8856a2c0f7550a
SHA256aec234a121824dcfad0ceb87d66389fc7f3db6f661979f5d2013744be8f1eb39
SHA512c380bc785a4709c21933bf316ca93c9aa6f5e16f82dda212cac4f0b886ca22e1189f876c9e22ad43892705c7650a37be5e4af5429ad7d368a2ec892914d2b80f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5562f65ac6100d0c33cdaac738a368f61
SHA1d58688bfbca9742f809bbcb82ad6f9a12f138a94
SHA25641ab5dce0ab475e31fc4bdb3266dea3532d89148801d1537a9218c9374ae0f19
SHA51261e6e45395299aeeaf50ced1aeda3cdbf55218242d0c6fd3f49f6e951d4f81aa31d091edc2c947966867ecd32cba571132c271068b8379577a3324a284b1c289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511aecd9bac870f79a4e4282c46763827
SHA140c63c43fc394a24325599057fb6ad78fb1638be
SHA25630ae978d9b760ad083a8f3dcc611302a830656be59ceac01a701738dd7362b85
SHA5129a9168360f8e36c2d0bdc00cf79290012e56480a85a5c2b464dc8147b8f53b505dee364ece12a61442944e4033eadbe04c4f42b5f95a6071524b7f0c1ec0c042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50caac38f0231901c5f0d4d8882b33baa
SHA1e64ad10d85536f7975983a6b776da4d0455d66f5
SHA256a6159dd18d19d213e3e46b0b6a57580438c782cb6cf30039a270389faa0cd07e
SHA512ce82743389484759d7798f94d3283d983972014f3989d91afd329e5597f1283c66b7964993ce05ceee6fa8a7fe937e20f9d50e341c188660da13531a231c87f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559cd01baa59cc432433f76a6c5d66d6d
SHA14a0821c7567944f27af2017bc547400ef291b8c5
SHA2563f22b544ca36823f09028c115f39045caebb29c64f3113264e6fe010b7573dbf
SHA51290669e50a00d3b215265a16a7878dbbc04ec571b027c7f9a3a0894e4514a53f03733e694a6b262345c8d6ee4d8aef7a52f6394acceb50e965e6e361fc3c57720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e33b4d3e80b615c8711486d533832f07
SHA165699b098a5e5faa615f073e16105987522eb1d2
SHA25651b219cab11f6ba79ec984fa529964a5eb1a0f47c205bff93c61da98a22aab95
SHA512734320525c3aa1249c758da6818ef754a25a603c1bd6f0d9ab49c896deb7e99f9c2aaf151f2ee521f30f5971a474896bac21ee4c921d284c9f6174e2324c2d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528aa097afdb546411df7f01efa94c6b8
SHA1c5eccb2abe7d1bb2c6ec6da1bc0bc459fa56b754
SHA2565445ad2d1a82315d356b726b62d788f6e53822a70ddf74b9faf363b1afb82270
SHA5126b31250c1f228112778b047f806a0e6097c31d2c3c29ce171661eae5276e33e3c8312e1a54d554d4c3b054947c4cae6f183941fd9aef5f67cb69007d2303135e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f3522da3292b15182bf4b5a986ab90f
SHA1e1afb9b1a386ec8cb8379e9827ffdf5256f29a2c
SHA2561b8d6f554766219e6c9ac516ec61d3fae1b0d8e0263622c0ba46ca10dd3d78d2
SHA5122f6418ec0273568c1788d8d87e582e04c7aaad5703c4116dfd60b1e766b2f9fc7c69cb2000ecb276181d03f111cb4d109e6c5bb0a5f199446ebc4bc28ffa017c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d5c1f931d58729e8f4e3cf15d5ca27
SHA1016d329e4dccba97f6499cc54b1ae9735f388e7c
SHA256949d4da3ba935fae0dbb45f704e8d59dfcf99aff56477ed51a5d44b9112907df
SHA512915d35acdc46120c0129112711ab6c5bd03ccd681fe1481436bc29ff5405aba3a43f510a5ffaafb7dce4a0a3638f66cf564301f5fcfff7445bee9e8e6b4c81fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531559e5fbda5a25a29e694ab1490caa1
SHA1d73e12c3b7b2dd53169c119f1cd12cdac1b2b8d1
SHA256bcfb660bcb6f1979d15556efd6cb565bb42abfb26b48ed83a0bed9a8fa778804
SHA512c5b8a932a84611427989c968d0eedc9155d7cee16ae9a04348a7c597dc276c7675970713a3ef8b1e1e747a0c1a518e10d951d9446a8fdcd512b24295a339ef5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cd96e8730988ea70075d0a0f9d18293
SHA178425d1f456aacc1b9a54cfc7e1977b4b3bfbcfe
SHA256d1da18efb377ef417ee6077721648558e125f9756af7abb0036f1ca36e33cca7
SHA512970f6b2187ed7f6ac012ce11ff9be545a6fadb15afab0ee7316cfd381a767df02b54ce7b8b21ed261b1bf1f370a5020bf55dfca64468adbfe429cb32e5bd328b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b