Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
af65875b920cde2cbdb0351f890dea91_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
af65875b920cde2cbdb0351f890dea91_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
af65875b920cde2cbdb0351f890dea91_JaffaCakes118.html
-
Size
461KB
-
MD5
af65875b920cde2cbdb0351f890dea91
-
SHA1
337a6521ae85176b3b1e7e07af464404b4a22dde
-
SHA256
80212107110607653ec66d07abf77eabd75ab3276dd1b30a0ad834b23c9b30ae
-
SHA512
2518c0841e86a811abd5091e8aa6d2982b14e29d74cadf5c5588cfe85eede3c079a750f0ade0467905b332b441530c51fa8df3ab3540c7dcfaf040420a7aabf9
-
SSDEEP
6144:S8sMYod+X3oI+YcRTAsMYod+X3oI+YUsMYod+X3oI+YLsMYod+X3oI+YQ:Z5d+X3l5d+X3s5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c04fba6a43bfda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001ea9e033b847854aa8f182d66393248d000000000200000000001066000000010000200000003e23f47b48b7e9d8d094c42ba25deca9d925584cd2b32f71d3ef974bea4d623f000000000e8000000002000020000000a48b7e4c3b2848337d8f38a19ddbb61dcb80eab1698a3ef75fcb0839e21fa13f20000000a4849f0b6fc013ee1bb049c3eadb0283a64dbad11b21d206dcba77090e58db27400000002d788ec260e714e5c8cb3662d18b4ada69d0025629a94f91dde2945808361769c183373f5efc03e39da0b8558b8fc34d8b57cebb05c82f94f81e977642bac7dd iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424631752" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{92386AF1-2B36-11EF-9591-6A83D32C515E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001ea9e033b847854aa8f182d66393248d00000000020000000000106600000001000020000000a1a92d5f1a5ec6da1bf420493bb3c430a50f1acba87d75af1dd43cc03e4b872e000000000e80000000020000200000009dfe5a07202a8220bdbf3bf912b5ec686709339f444e9ca02d02dccccd6cec2790000000b4ceae72927edce1dbed25f2a60768fed93c33bab890f413b1013351def29663d99c8be3c6d2edb86af1953e4eb939ac8eeb166062475e95dbc490e4604406d13a14385b350215f7de18cc4f016e93ec323a1cf781e71e2fabd2a8b3f48a606e2d71437006beef12651e1c647e446debb7bca56c5c19000d55026143281a2f2a64e8756d33193dbdb542cbfad31b00f040000000f27ebc64c5055f9ef3aa2137b56b8af997088b8aa393efbb5efa16039d8c7976be7ea2abad6d44b319645821edfa3fdbd8917f94bf6a172908ea68b1f40b7428 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2560 2324 iexplore.exe 28 PID 2324 wrote to memory of 2560 2324 iexplore.exe 28 PID 2324 wrote to memory of 2560 2324 iexplore.exe 28 PID 2324 wrote to memory of 2560 2324 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\af65875b920cde2cbdb0351f890dea91_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59118f3d6b1752ed7dcb854dd01aa5e37
SHA11be229dfff960a81d8bee75a07a4d140d84afe84
SHA256e036b81304d7c027d8ee94c46b31f2078346b7c6d70036796f259bb386893529
SHA51278f39a5d877b78ba0db38592f602d516a8be46fb1b71922aee38b9a6e05668c5aa12d8fe68dac81c4ec86ae9097070fc5d7e347e7a43d10bd5235bec3ec01fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5258c60fabbc91fd38572f7fe5fb7270a
SHA1f58baac756ef5c8a4f3f3cbc737e3ae6518df6c0
SHA256631661942e65fd3ec6ff2789d4f332f2a641cd5415d6b53bc929d29eb75d00cd
SHA512b9c4b11684f63320630ca5dd024efc7516e1798388dad6967f81e39bec24c49ef5223a648fe26128d12f5181c05ca3db19cec5a91edcf3781fdf442f2459cc14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514c8f39400a05b722e63b4c95d847086
SHA1376e0d6e480b524bd935e573cd2b7cf65da2c133
SHA2562abbb8f2e0d76d4fd3eae314db5c65a82dd86583f95f4b3a4c5142ce6da53f39
SHA512e3f96bbf3670713baa359de9370e95612e97c2ae514626e246a740a707ba1b444579c10b591c1d1a5475c12f32cdf8c0ae65ec84018d4577e329122808471998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f8af9a42b10562f3e95783a79074ce
SHA1ed12f861c144123f2a1319535180f0551d9234e0
SHA256f1d8ceef8e390ddbfa1c5b72db4d3637956a6f6250d91b35125741fd501d0bbe
SHA5127449a817fca6dffc337ee5ac8a2e20672242ed3eb28197d2ea41b4a2854f3b9a607cde03ae3cc2f59f868156bb94586c3102e98ea6e1a242e1e0e69681ace972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5413f856051711d99965b4d1934e93f3c
SHA1d7db2c97171edd53150b646348f34970768dc7cd
SHA2564ff9ebb4e947242e27fb0a694d56eb7bd51532c31b93d67b9d65e56e0729805d
SHA51276c6c46d055a5446448148fd5c48ad871b28c45e4489c99e8b62917c1831c849848ff9a3150e386d51668212e084f0836fb0b1503f08e49e72bd2e51445afa51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5398df2b7726cd104129a0acdfb62aebc
SHA11159d6e5f4ae7f779efcf9f51f8725548c25d95c
SHA256c18190976c914ddb9dc8cdd09a15d8d0bb3140ec2d9ffc20085c3ddea46f8103
SHA512540d3d952c09b213c80749c1fde1fb2aa1a5779f7e2702029cb61de9d55698653f41064a722daa077fd8bfc55db1f94638f27fcb2efcff47d9aa7f1fed8923fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5862b5767d166104f5aad6deb4cf23cf1
SHA1de95e59d47416020b670d149fe42c5facd4f5475
SHA25673d626c3957cb9c16712069a86d8d67d046b0bcb2bd691a7f70c4de2d7652a45
SHA5122ebb80c55285a393e32416ddb592984560df82df8142926c5e008e32c95e9a41fe02699d97b1e590b485cf46a2ccaf0b683dcd7bd060b9acb039e6947937dc4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da0da346f253cce329c9bba49d1afc9
SHA1db000bc255428e8d8746c028cca7bfe3fef398ac
SHA2560013a45b53b12428df4edd5ddc6ffe192fbd1fe551f720656ee765527ce71380
SHA5120367b78554eb99d54740d81ee8a409347d2eb9e2197ab8faa99cf10841765d123f6d210f1ebaf3544554a7299f867baa379de1a830f7abf408e1748475550210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596356cfef75b2ac8987192c2bfd8b6e7
SHA116b74c391c8d2f662ea2f1c402503c27525a921a
SHA2567247c6d34da245c10ce0e8efd91af5f4f5d39be3cb39da0f2b438404c09d0b28
SHA51298718eef819ba81da6b25545010b17312d68a28fcb3a883ce8e33944c119a8aa3305678afaebecc595003c2b5f9837eb69c5bdda81c5ade6918bb67b679505e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c78430edd844c3f734657b10bb461ea3
SHA109d35758fe221e6b6a3402339797015e90285384
SHA25603ac77a45c1cbd5df47b96d195a7bc4dd075543498615cb686e6d039a38c3d0c
SHA512fcaf06f2888856cb2d6da107d127866ac2bcdeebc056f36db7625a1f0abc132ccf21de2883604ecdb191c93c1a62b37f203ff4f4436dfedbfb9725652df104e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567e3eb6193030c825cecc7292fb6306c
SHA1075d8ed428761aa34b37baec466decea1395e3f7
SHA256bce9cb137a4a5fc7b37ebd6b5218ae91f7b378f0475bf487e143854bfe326f49
SHA512a228906ac1fdfd10ebe5b03dc11c46735daceac3591460fc12f1349526f387f0436f045528ef94d1368f1a4969fe81c5ccee7b23562bc250bb2f5e79a25655f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab61b66811199af565867dc57827e8fb
SHA11d3320afa83982619318dc86b35601a4c2c96204
SHA2563a2d9ea3c2e3cdda1c40dd529a1531c10cfdfce018cf242ddab719a5b273c7e2
SHA512965cce6d04367d8c19874ba345f380cbd97f4a245acfe87f6f158b0538c10fce5fc81c30dc4ec8b3087b6da4f097de37ad226fc9ad9d81083034012276fa9739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c15dc2ae66c58ba9ffe332b2e2f15c
SHA166912f80fd801b4a290c56af5cc2a33cd99abcc9
SHA2564298441dae3005b65037056ad06ebf27c015de837d3906cf06bd457c53d52e87
SHA512ae28e6554d8c935edda5d1f58726db6e8815088f639b40f26b7eec987faa70c376611f86d43dfb2edf191119a3d6dd704cdeb85744564526740f036f6740a125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb1ba62b995b1a0f1057d3e91c90cb13
SHA1e764aeacb05d140e754eb450442aa9fb0270c53f
SHA25627e508e13024f03e15105467243115eb99f6d8437afa687227bf99da14fcfe56
SHA512b3763b1a1a95a4924f70e57e612292e286464714b17804f15aeae08160e26f099843b11879816be4b3d3aa0c5f84c92a10a095185a09cd225bd4657166a54d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53211575372fcef82e21760ce19c0f7c5
SHA162aaf7514f08a950472dc8fb88aa3f0f5d027dbd
SHA25676ea7ca678e13b12325d90d02294c48b805fa14c17796b9e40011b7bbee11aaa
SHA512597a1e2edc76dfe7ef2fcd4bcb9729a250c2cb5673ec9d80d93e5ccdb77f387e9d8e302dc191e3e11d6a5563144b973d931484ca016d7ac6a3aa6fb4e5bbfe00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e894385bffa1efec9749c319df4a32f
SHA1ecd8e5558d614c15a21c5cd12500c79dc8975865
SHA2565dd16e5fed0fbeb3d9fa1e88b2d50df4d092c42e3419ec7ad816ffce253f774f
SHA51209a0bdd00393b38fcd81a4a967afe3a4143ea039e756601b78968c1fb4db558ee6787983f6285f6c82506f9902d495cbfe97a6d7dd43873f225b199bae6f182d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeadaa2534e5a7d3f848907620953efe
SHA1adbabf4bd3aa3283a719b32053ab799696621378
SHA256e756d2af860b191ba9221145d5762b4e40f811b154ba5722677f436145d8fb97
SHA512a75ccd03c4550aa58438e12a4f7c90a267a4b9886ce8f2b9f47c6db485f902b4576c720e3d7c58c6574a02b21e01fdc1ed6340233e0004acfdbde54ee6e9dcb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a337cc0a7dadd88b8f0cd083d35a1ae5
SHA1571ebf8c779d557a72a7a48da44860ad8822c910
SHA256c3417ecc600f5e6a146c0c5738ddd221e24fa74454c6afa40599f717ee5facd4
SHA512971e3a40bb48f3de6e331bda04285793a376043aa88390daf7cae7c5913a4da41c15ca671ccc3ac995ebce1388f15d566b579264ab6d07a256804792909120b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580c972a5dbbb9c4bfa013975366f7721
SHA12c069be8ffc38dec1c992fd6fdbd5d8103b1fb18
SHA256c4d7e48d81fca20bef0edf4b16994f7a4371b046d2e4183a16ff3772019be157
SHA512d490283b7afc2b5360b2a48e21fc02bab40e991540624566600b21ac590f22084a0c2cae86632cdcb3eb4126182d4ef0140b407c2ee51cef843fa41d0b8c9017
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b