Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 07:00
Static task
static1
Behavioral task
behavioral1
Sample
40a68f2ec93f873b6d35230028dc3250_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
40a68f2ec93f873b6d35230028dc3250_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
40a68f2ec93f873b6d35230028dc3250_JaffaCakes118.html
-
Size
108B
-
MD5
40a68f2ec93f873b6d35230028dc3250
-
SHA1
9c9e9283c4547e1b61b68e2ca531522a27b329d5
-
SHA256
af398b459ac82ec66e387edb968701a7bb163562dabe2e8a0d915f2cb4b0f930
-
SHA512
ff64bf59aa17b806f9630f252b1001ba3ddd6a2513b4b7954c080d67725f72a911fef9eccd41b7c303b9c14dfbc50241b5a1a1cd9ce3d9a193723a0ca06bca36
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000c75cce1c5f441e3c45a7b972f7129f478c6d90af90c3f8d672a82ae9d84e9136000000000e8000000002000020000000b3ddfc9f46ae958447622d473d433020390e87c91c0f704c82d795042f106e872000000094fa111a144708a2569090b3b2cda1258d2414e6916d5602ca209ff0350d3d0840000000befd27673c301d35aa07508631fd1a9cd9d666f88a206af8ba2e1172186ebbb212af774145bbca7408b8d39c3d6fdd174aff3a2054803bad46ecac0da41491b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000004e131621d986317c66037969fe210e471fcdc5ef11b92c4d2c0084f47550b7cf000000000e8000000002000020000000b26792254250636193efd45fb6900853a4dbdf448f6d1c925c0f9a25500fb7ab9000000022e8603defa1309b68eb27e5c4027c4e80a0ee20490368158f72b8b76437d132636522d4044e7b0864d091e7831c9c003a3a1ccd45c682045b4cd53e252be8a70d3dc7b4bc2182ab5f0b00fe4eb9089855294499c7b14ddd0ba18d291d31572383c2dadcf3277dfab5a30e69144506a9159a5dd8f12a5e69f178c93bf431697c0d3318a2b5742a09b56ee71ca041c2d44000000012a959496f455d82e6bf2d655002b0ff5cf83a39ce72ba6a10893cd05a1376aab4743d8f28b935083d0bd1ae34ef67c9b28d589690191225c2193285dcd09dd4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427015883" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E690B41-40E5-11EF-A7C8-6EB28AAB65BF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b9145bf2d4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2520 2040 iexplore.exe 30 PID 2040 wrote to memory of 2520 2040 iexplore.exe 30 PID 2040 wrote to memory of 2520 2040 iexplore.exe 30 PID 2040 wrote to memory of 2520 2040 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40a68f2ec93f873b6d35230028dc3250_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548e92e246515f4c1944ab443e72c2854
SHA1403c31fc536fe59216c72411623f84712edef957
SHA256cdbbfa26589ad0d972bbd200785685f0fc0a26e777d0ac84d0f8868913a0542f
SHA51247a23c4480443c942bebbb235926b6de64639482e47b9921b56ae74d11d4e276f8cfefae0c15ff8f133df0ed12700fd2ad7362e95d0d8eac9ccaf75032bfbc6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aad2ba78be9f7bdd633e13ed3d9e345
SHA1b9696c8b61fa1b84d650efa619c8d9e1d0491030
SHA256239392a0778cb3b2a9f9afa36cefc91e225f71f3efdec73d8471f5104ee4e2ac
SHA5129fc0298b0cc2ba3fa5e744fd217f4df5be6f8f73c5a75f5b022f0d550283a2e37da4373c23fe9f1f450275681ed4878ba99379329b9cc6daed4d891525113313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b352c91bac6fc6960b36a732cdfd7cb6
SHA13099fe7f73235eccabe1644f87af1704981292b2
SHA25697044aaf6ab4c4fbadadeeb20ae40c6f374a615beb89ea1577cabf496a15f0ce
SHA512eda611bfc5244c249382abc779cdafe278be5ecacfcc1b7b4ddd66383fe3016e08214e330c1f3183b95633f4438ec33cb9a26a0318d469485f3a0665605fc978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa39977143ad9130b3447a0be34cdc3
SHA1e41a06d575e0162047d0a3b9cc5c7cb59ca3db99
SHA256b7f735ac4a9b54b8de936657f2b518a7e065bfbbc0be5ddd405807f59741fa2f
SHA51239b83e45695dd0106bda5a51ee55114110aa42006900b925d3952e05a71462d41854d1056dd18c794724835f4733953173711e54fba4824c2964adbf6fa2e745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564e8b2412c80902d71e3e321d619785f
SHA155556ce3db89b0cc9aa4d9916bc00eb203cdf1b5
SHA2569c62678d0a24a0c762d46e16d8e4342427d777f13ad9a4628a7f35fdfbd1d65c
SHA5122dc72842a77c5570529e23b26c6df6dd0b2cf14c4456b89ce90450fa13b4c15cd156ad28dddbdb51a0cdc7c651285c512d00a8df293d0a0edef2bf08703f4663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53532f4ecee2467cccd1b535d70dc9087
SHA10a63c1a30ecc9fa00538b6ea7d96c6a2d10e726f
SHA2563c4871ded58b575a9ff58090a72fa3374e0c9a1fca5ccd5f2cea958491919c1b
SHA5128584758636af42350adfb1b110792a65455e9fbc9bc75da71cdeb58265e5465771c7a1260c828b85341b1e0285b8691622c5f6836af92f0bd0e691674e2bd569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b3939736d7da03f07dd01594ae2706f
SHA1c2304a9c4404ae371514cf0a05c3036ed6474458
SHA2567b09a3963d68ab7182cf7536c029d4e9ccd461a0df34cdf32cbcdcbece038079
SHA5125133263f94754bc2ac13465a121ed2877804a26fe1c87c1ad4856e184eb67aa817b6491f859b085825f1d7ac315970bfbef1d93a10b1b26a9f3a98670ebda1fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571cbfc9df9dc907996db9de43ca0fca3
SHA1a59a014130457c9dc8058c914d102771cf64c23a
SHA256228f2bb12ef021e24b04d972bcde0e4978f1f2d5ab54c61da37a40f477ac3579
SHA512837219fd7e868c8ee6a848da76878df813b1c56d0b1ce3c97d10c336559d2889791fae43d372616bddeea21a44e8e221d271578276109b04e39c3fe42561bbf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e920f0c8c4569f33b3ca758776a4a5a
SHA15fa414551162011301bd5cc46c498f37ccdd195d
SHA25611e99dc9c76b4205ea8256c29f2bf3729f7a172029b81f29dea82de41e7ae3d2
SHA5122a2704094e1eb0c83fb074dc5e7d9034761ba722622c6893cd2d1d564b7735dd55faaf88ccaf83a86e8774e67adad8ce958a688b67669f5fe621c3a7d3b1905d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ea51b11477c59539b1e98834983cf1c
SHA12fd7bd54646135747d92328dc6ce484761d8a89b
SHA256645fe88c2933659e31d3e311f2919a859d91222eb323e589bd53ab1813514793
SHA512bee2b75906a7d716e0fbe1908aad1c3a675f82cb8dba0bbc098a0df74162526e54e116537dcfb98e572b8f083ef1402c8b794885d2b68cd88cbbec774e58c2dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519ea22dc36a5635329b45f9c7ad7cd8e
SHA1af00b5a61cc5fb1285206d0b4db09e02df87dca6
SHA2565c4b2f3fa0851855085ad66907c186e4bf6a557bdc4e4100803c02df8722f80f
SHA512762b5cb88952f6fa0be8ee044d66a07dcc80d0037c34dcc08c439e27183317ec31f253725a0093a93830e8e15924d6d0cfe552019f06064fc8f0d2303d952274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b61009b37f6a724e556c6c918968501
SHA1facba8da48414cdd79f69d1557eae2d571388bb3
SHA2561016719569bdfa6987a000705ff2870a2b56c55530454375bf4b4fed33039ad9
SHA5123f80bd6439e39ef7870df374d4af18a9d6f1eb055f1f8b707f43662056620d8b8e15ceb8097e7fd9b1e0a4796c9a82977edca6c59b81d449deda368c7f8adf41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea6269ba0eec470cd107240df33947a
SHA181f08c9a59e33c9501b782173e6586c4ec22fafd
SHA2561f3ad98c2c0efbf542bde994392ea4203d3114650c510b9cca351a0e68645e50
SHA5127cb2cbd34065a3e05f592e7380215c584ba04595cdf5fa4c755a03f9d54b2d74dbc14d319c5a43669c2f1236364129ab0880b343c9216c40d1aa545e6d05944c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bade3a18b5e3e1e2abf63a4ed7887a4c
SHA146b3bfd365d54aeab4cb3b0131b6863598c9ecff
SHA256f25f26d1462fdff08d81612a2f73dec3e15db24708775336c4e3c74c59175a5d
SHA51250209e0c099fd5816418a655f88cc32481cc5dbbe6a773553d206c7653ed14ecdc22f1e906d126f138ca062fdd51ae764a0e5349951162614a1c6e18ac242bf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5929f413efb2317bde20194601dd98dc8
SHA18ae341a9ec59f014073a52ce7cecda0dc7d81456
SHA2563e85cfc8b2be5c377b51a01cf74552b4ec889e06c66137bee0c8949c65d582da
SHA5121a1c5bdce8e516f17a3e91399a1a6ed3b63a0c0cfe6bef37ae14a118f87b5c87722b3a439fe3fef5374172a3e8b53c44519a00fc9d0b69d34996a3c477310e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5368bccf111987e22b1bea3ddf126e75d
SHA15dd4e05bd40f68d10a29898c320b048de1370869
SHA2564817c2e61901bb7699bc7ba4f0b62f686a3c6ac9a459c4b3f20a8e4c6902c79d
SHA512429d6aedbba14197759cceae837d04df27d0d59face4c51aad59edc21e5f7e43eed4a1d2164348a374155b25735ecc0258d2893fe7a210c88f6e0f155e89233c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1bd21e661ca4d38e3dcf278cfb23be2
SHA11bce62164cb168d7d1f824159b0f9ab7a600079c
SHA2566317d731948f69d5a50a7824afd2ac52d166fef09ef5e991b48a6c74c99e1c58
SHA5120a421b8fae112e403f1c244421fad252b15a2cddec9a454df9ce27544a99684200e77781dd7735e1b22693615a680f07064c4c01609ce98f661f63aae33cc11b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a13d34708f6aa5dc4fcfaafa1d98a44
SHA1dfa0f7fa6b67a4ea8d0a30be06d85437b74f0fb4
SHA2565052f2213cf8439050d9fca4c79da414087c32888b7999ec1d796a7701322538
SHA512a5c2d1af9510ab8e3811c42d412fe99ee06baa174f84348a503778d884e1fe034ffeff20bea91e4fae695a48c4282e160e0699ac75b843cb8d036bcedb7c014b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a02830d0b09284c8d12f472e84d31c5c
SHA1e0bfd434bcfb6474e693ce7a770a74feced14625
SHA2561216edb00b4458870cedb68859fbb37447b521ef2640ae25a888542269fe916d
SHA51290ded6d95428a2a84238b2f9053f66f68e0f95900f98de193552a59df733f676573544cf6188d17695c721ccb039234d5733db0aae505e72ec231d1efcd992f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee665b6d4cad4b93b6cb9f57b03753b2
SHA17df9020b583c915a6eff6eacb88fbb8f9b13091e
SHA2561d54c8b19bbc0af068e08f28aca5e48009c2c249114daa72e3d11dd37cdd2846
SHA5122e983545d729adbcb6d6c2fc33dd06f9b49354c8321afc8a3f682b4ee5a224dc6c3ff68e2c99e5fe9e42e26d21acefb3467cf351c663f25d2d7e83c51074d426
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b