Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
159b32da9948e0280b009fd380d57ca4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
159b32da9948e0280b009fd380d57ca4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
159b32da9948e0280b009fd380d57ca4_JaffaCakes118.html
-
Size
14KB
-
MD5
159b32da9948e0280b009fd380d57ca4
-
SHA1
04f2be9b1f2ade42441d5367bdbf5c3d9e9e1a5f
-
SHA256
bcce26ab8d5c41c9ed4130399a315aeed7aaad8ec2928a160e33dc7f8baf449b
-
SHA512
3a6b69e26700938fbf99a8fd8b0a17153c2c9316273e6810277c126f71b0f0ca9f980da13e9709c3d36c210cc2ec659a4a69e1ea226d12a971394a9c28314ee0
-
SSDEEP
192:qd6qYNPMMnIooSG1/idPEEigKbqHY73WuNpx8ikiuNphVa6eyS8:qMxGCiLq4BehVa668
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000ff707d6b7bd5f442de99314eaf295df36772e59da129bc98063cd66ecc58d499000000000e80000000020000200000007882475727bfd12b1862352849968cd9ae306fde112361d3a9292fa5f42d10f39000000095494012a647b5bc08b3938d6f77896c1d1b33b867f2dfc1bf0d5eece910cfe666a9e5d0ee23f41a11c9b774b37117fbc63463a84f303af136cf49a2e0204601532899aa6bc189cca467c5c3cb37126aea4cbdb4154580014e687735899c71d640b88928a156393c9c964acf414d318272e46cb194b7e35eaa964b1ed5abd29b11d81acee539507cf0c2d175a87e7118400000001a554625da519589b015ff8435695eadb16bee6283291e48e1bbe4bdf38734768ce90301da5716a065711a3ccc89973349043f6a8b8dadb44d2df5b9724de407 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000daa2f291bebf60a890753c43d13d78d882cfb1aca3047cd0d55f3892278f0a74000000000e8000000002000020000000b13e7028286fe449ea69cb0581f4a2a6e331abc7435b94d5d5592dcb442b148620000000835bc6ea0f14d539674169d36a9b11d465c8bd98ab5adbeb51d8da98b0f8f4424000000033fd92a3f43967b9d19014fac94771730bd21d954e6cf58e04157de57b23b8abf3004de8c121644d2e67bafaef95b073987fad4e51d934705c9ddce99092c816 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434252865" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d082e758c416db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7883F291-82B7-11EF-A2A1-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2392 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 552 iexplore.exe 552 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 552 wrote to memory of 2392 552 iexplore.exe 30 PID 552 wrote to memory of 2392 552 iexplore.exe 30 PID 552 wrote to memory of 2392 552 iexplore.exe 30 PID 552 wrote to memory of 2392 552 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\159b32da9948e0280b009fd380d57ca4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:552 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac8fcf974300c769fe77483077efce7c
SHA163cc9c38150c4092000c77adce4fde58a48df516
SHA2567b60ee54ef45cb7b849da55228a50a2e3c36cab4c68750443c0e0f46b7739228
SHA5120820a099ccc48f21c8e6f665d4d52a2201641437796a897c2e26dfecce1249470660e3055a661329190baaa6ec44ee44cf116ec1bf787697ebb9b2967bf6d28a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564a4063cf421a68db1a30313f40dc156
SHA14ed3da4ac0d4b3c8b0e373fca8d93db7d27b8cd6
SHA25604314b3d9607861bf972e906c8972f715b71788c4fae2c8059d70038ebc98aac
SHA512fd5430e12434ee0c792eb4a2da3ec5b8a9327c40fe6ac6c1a309c048715d269eb01016a178544a4d4dfb1a25a35280ea18c4398439e7a0adc8699412f05d060a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1ee56496f4ad7ce2b126ac601c1aacf
SHA12b6cf8997b119270065a3f751bb625dbba097a95
SHA256119b0620cc652c85aeaf376402ed9978916aa5a848fceaf9e8eb7b8a3ff13c4c
SHA5128e254c8639cd184edab05af7c025201e63d640f92d66f634bbe964236f6c4cc94e2ca46949c6ee70e81220a44946643dfee91152ab6431de3c10ef5b1ab7c682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e94dcc94142780bffd971d52dd9e1ea6
SHA10eab857f660aac76fe377a994ce155bf115c9201
SHA256e3c2b54bd18e58c41326b52690218a79a3c4ea4a6a2ecd363afa31c70b8b1235
SHA512ada5768ef63b7890c05f8775398f046fd31bd30f857b0e06f48547601958271a912c5a8b2985e6a4559e71400a9f94b254613c58f8f2566618b17567dfe2f7b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aed06692144a375f8169cb62195a4567
SHA1325e98432bbc4139f33196071dafdc2c057722d7
SHA2568d0d0a7bde9a611a379062e9b4ae223244b27ca2a9129c111468e7ce25ac487d
SHA5125eb2205bb4f3e475b5585c093ab380b9bb4c47d9b6b2dfa835d8c83fc3194c272fb945d13707ef63e0013c2656b198211ba723e06daaeb52a1d8719114e587e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5904f0a67911fb383fde99979abe87a
SHA138c63a1f7bd743f2eb0fbc4235bd6a8f0aee8797
SHA256d2a58645ea209e2d7f1845ec856f453073424273bfaf0cc7412815f38a671ef6
SHA512520fb7132c7f2c37845f411914c16a96807d7aee289f942a696485a01282845e186730a9dac4b4c838a1230be1524e4426e335fa28ef28f4d28484e481bf5f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55da5a0fb1e8b3d91d3cb574404bb2812
SHA1ddd3015649defa57453abf961a436cffd135f00b
SHA256173cad4fa1f36d1350420d32ecc2363bf67971607d44bc266a3cb5aa6f0e4dfc
SHA512d32f681c944e10926213058e7c003921940296ee0107bfb301c34cdbdef386f96e52dacaafc164f551623dd93127a1ba3f257d23c2a6c346ba073e81144b84e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddf41caf885734c473e0e320359caf53
SHA1fb52e34a0f59d334405ba366987d33f896452292
SHA256e79462471da254c7bf7bc2e0e6dc561953eb0437c008d8c731300dac9f9f6ad7
SHA512c3b6bd46893010ae78078c41bdcaf77b1a5b25e8ab589eb234a762e6026e33311862cd23b521aee4774ce9b7d961000b37b4a7ab015c91d13a92d52afb08ec00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ef3b8f8b0fdb891c715147132b4ee31
SHA174aa28c6f481e5d5f07fc59a001c22b26c151e6f
SHA256c3298b12dfdf78e4b12aa357a4f99d1a89c93cac371039fb4acb5c3e3a8e71fc
SHA512d31d86878be0228ad22c69de19b7f440a043539900df1a0d9304fba4ab844a5fd1c380232f0ad129c51a6d86a67c602384acc445807a7cabd29cff074478163b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a6bc46d46d76f1b9806120c61d237c4
SHA19e5d1e06e35074a6db5329259ccf3e3fd39a8590
SHA2567939fe2f1d7377067600ddc96a225b864341d7cef9563b64d1af6979d62d89b8
SHA512e3400eecfecfe55662c7bc9f78bd06a629a28cef627e42cb62e697546e46d1115c7745d459ccc32cf0e81c04eebebfd6b96795d72703f54bba8bff8ba1db4550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5123c252b674c5890481740a33ba60e58
SHA1cce2eda1fdfac34ce9a308663d46bcc406ec1910
SHA2569783ae5c7ddfc256bc2716ab11f4bfb4c4ee3bfe0d2554a0509d4d126ad2c5c9
SHA51257a19874d845eec00a419a932e61a358c01bad20422f3526324293abd5dfae1e802a1fb8d7320b6e511a144d68a0437a9ccade856f1b4737c67a215207c081d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560dcd14f146c3e8af83c62cbb9b9fed7
SHA159e8ba3a9f8d0bde60fef4f641df7d78aea89f40
SHA256d497859acc294a2e4eec15a5b75276a5e2ce799b57ba5cbea332782340c01de4
SHA512bfede964064e95a90139c6bd19ef198cf662519520dc3622367057ff81179225dcd5a928ade40b6bf294e842042018a41233d3faf7c9f3961bc2b7d82484344c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a3b4b11cd30a9b85eef373cc5c54544
SHA10ff7c3f1153d5e21e8b7e4df5f732d1092f54ea1
SHA2567caf4b246bb807a865055098b505dba8bc8da037d56c6df4722b5fc810d81e2a
SHA51288c01ac70163b0218454036dc0c77a1f84bd9c3a9750f97d6de62c74d703f9af03277e49d8a04570e6a5686f8d70456171925928ebd754715f2e2a9ca9f73634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587252508e6e357928b43a9edeafa23d4
SHA1d687da4a28b0009d165d0237a5cdcaebad676823
SHA256a6fcccb8295e630f7f2a8b7d54e4292be9b2250499e70b0c2f68a1a2f5a9da2d
SHA5122bc2e03dab69fd2d54162aa4be3f5151017ce9fff4b2271f7f371124b223c8621b644a5c8efd547a6bfcec9a4ab2b4c54ed4614e541642f06f03e7bffaf24682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54966dd913ec4810d1a04f3d9908342c4
SHA1448b92c50c575384a4b9debcc40c1a394cc85d24
SHA256d01cacf64d8d04eb570efba91cca980ecacd3cb67ba28388151fcc5ee6d964e6
SHA5123ef67d916ee50852db22c6672f54179497d4e7c3ecf52ac70df822d74fc033dd078db0a74bb02ef1753873c610b7978a9d6a86d0594bb6ef146cafd0fce50862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e9d626f3f4bfc6fc626d02bd4ec4b5b
SHA1bb63d02a6a3ed33367c2c722269cccc06be5a119
SHA2565e1d6a4c10ce770e19b119a2c8eceffb50b76b65e3de16dc496d7c66443c4400
SHA512c6c4cf1d4af2160134d9a7d55d17ab4441362611266cc8a8174f3cb27d262d3a7c56bf914e2b50064974f597854bcfb476e885a43c52b0b4a06ae2640bae57ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53299d176f295b337c8b0dc46299b0c7f
SHA1a6fd74a7413eb262a5704c9efdaf317858918dcb
SHA256cff43ab186ec5ebe43bc064b429bf047e5a28edd14de3f2c2497acd643dfaa41
SHA512fe315e250d4cc3510b0a72076fd372b34459f3519b790e233a6a77c41f6c88bb02a82d16a64d870ebe937aaf46427b113bffbc27f8c91eb33e3e3e11d331c6c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c66d15456207954c99a3f1522a9cad95
SHA18ffcc4dc33d2f8aac1830133285b0703eecfbee6
SHA256d73568f35e522c41b90a07ed620947964e4dcea58db2981eaeee0e9a4408b006
SHA512ef9d845edcc1a7defcf985bfccfa281d9214387c069cf4c98ead2371d0557e3c394cb4e7a52942b15b0b17245f805cccb48f1f8d9357469f51e91bf3f710a347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b0724436a4a86c0a5542d432e53340e
SHA15062a3fe046dca9b172ad75cd609471407fd899e
SHA25661abaf8689446cda5e2d678c129abda867494d8d30d0fe82912a3dd2783dd5b9
SHA5121934ed9112aed270b60d594a3d26a1fc3e4f961f8a893ca726627949a85c08135da6ebd2a3febf1dda6557023b0de10bab5c42d12d1fa17443f49a5f8f4f1fa0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b