Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-08-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
c79a3e87ab5b16db3e6ae6a3df640470_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c79a3e87ab5b16db3e6ae6a3df640470_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c79a3e87ab5b16db3e6ae6a3df640470_JaffaCakes118.html
-
Size
70KB
-
MD5
c79a3e87ab5b16db3e6ae6a3df640470
-
SHA1
1011dea1155653f873b3ca6eeae37862dd7baf2c
-
SHA256
59bff8fa9803ec96c0199de2613bb41919c5aa4b6c06cc63daec3607859bf9bf
-
SHA512
450f03dcf41a84c11e70d9f50684cd646d4e39404020f79581da33e5424816f0c48becaac2263556128aea228a4595d53203c3502f767312d5f3b09e817ac472
-
SSDEEP
768:JiCgcMiR3sI2PDDnX0g6s/6RPPnIoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JCSTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431039184" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000058faabfa7c9ae00c9ac1ae499ea3e3abfc7a413b7b2f2af74c501f5e8a70cc92000000000e8000000002000020000000e2328c5b9e4935ae11ecd2cb12fbc926ac63bd0e0331cc68917640f21bd539e3900000002d289b707836ec7ebb7e0acf8c908bd9e4b37eac23f5feb768a32a9f73c46ae70b5188785f1818d357a30e132777f3766e148b7f46833205a919e5ef1541fc28d6857ef1da5be21b9144ca292ed8b56643f779d7250af29db6e9fa522f2e448539ed1a89b71a660702748e65b57c9ed230f83276e380496907d4d9d12cc7768f5c7c30624edc5a28037cf9f90b985da4400000006d743fb55c10b7195affcc243566e54d561ca40a9ec9843c5f2273a456ce345881f3856d7979daa63e86cd2f8e5727e9c6223dcb20cd94e929ab5fc211af10b5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{06E99741-657D-11EF-9982-6A2ECC9B5790} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f59fdb89f9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000f3f6ad4d305acbf30cab652754ef23217bb8dd74776863a76b6b65c73c8fff8d000000000e8000000002000020000000081ed3f080ba612aa76b6ad67735a4900f025fab0b654b865966cba97de5c87b20000000ffa852887f60a5b7289d8cf2d3329454108d38fce0a89a281928f7551ef3000f400000005bf07752cd4587afe817b09560228f7c77e01816fef3a250720f1b378f85820cab11425205e1cb2bfd70c70dec256289ad348848243c49d12fc2a1ebfbdcf60a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2824 2668 iexplore.exe 30 PID 2668 wrote to memory of 2824 2668 iexplore.exe 30 PID 2668 wrote to memory of 2824 2668 iexplore.exe 30 PID 2668 wrote to memory of 2824 2668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c79a3e87ab5b16db3e6ae6a3df640470_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543b13a83755d0615d5cd460bdb94373d
SHA139c87b6068635c26c4a24fea3ae535d2d5d062d1
SHA2567dd26705a333bebedb1d279413f082c5a2a27dd996432842bc369b8e7f3302ab
SHA512afcd66b8b91f094539f6ebfe0365c3e8281d0847e2b4bfcdff7d7368a2f2c70d7aabf88187a72d2de55f0f870a35cf19080b4ea9ca1168b7aecac495dd2f10cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554ba744e8d2795f076583edd20806a16
SHA13ec16d3dc9f9e2fbb4cc59e61634e83bd6ff74d6
SHA2568d507c3a6c667fc33c35246018456a4363fb3e80631712af5340ead8fe95ed48
SHA5124ced53ed019f33c37998234465872a676d8d89b551ade69655294a9d997a70933465ef5eaac964c0ae45cb1f0e733171904c98f48ac9bf689038a866beb531ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d9eb6f54c57170858d339efda689d88
SHA132a465a29d6f523febd8b7d9a0cc99df5bc227ae
SHA256e058da39e9bcb909d4aaa1effbe5e17b6087ce357c5e4be5a59708288e1787b9
SHA512e12c56095fafad90859b4d5e3022d984aefb07e072f00680671cf2cfe4798a3a9a4b2b6c5b5b7aaac4647175e3c608545559908a450b58867786e94d169da5dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb8cb12fc87c4fae8d313abc992cdb26
SHA17d2004c455635a2462ee20ae28ae1b40444b4b3d
SHA256ddb55bccc2a29bd171a4e5a03d74da7feda340306611f9eb9e0b1615700a2812
SHA51249f343f0543779e71ad3c76f121aa264468130d7f8ad64c3645adb35c6426560421b3b6acef5fa372899b8bfd6bf9ab373e34500a7e0f265e4b5ab862f28dc0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b73c03d0c70cf306a4c34016e167343f
SHA1e8d9e57bf5b11fd6bfc346197ed12008425a59d9
SHA2565d4027158fbf83061169d8a8b9210b3c860f938c8a22aae2445a9a037f763b8a
SHA5122139e86a09f820cf832a3eb1c7bfe28209121840fee35070992fbaebe695428af0ef2a46947220c3bfb11676ca7df44607152d95dabaab120e3b3cb3ba60319b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57be895fa85bb030e34b61912f6bce42d
SHA1b868a8b2ce4491bd9c14223f4080fd1d4aa78884
SHA2567077c8289940a277ffa21c6342619e3b52d877cf9bec7c97dd304a032349b188
SHA512236c3bf4ceb8f14e23f5f2e3864df0da61e03844fa86ed060d93f8d8ffe7264fb29a48a5e4c84819a2bd9a53a707cfa8ef104ca060cc22afcd03e28a1628c4c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b3b2c6f396fa291b74db2aa4532a5c0
SHA1045d42103f68e9cd45f456c09bea188ca07fe262
SHA2563eeb52e830bd1198cc0b9526ea73de9b2158d5cb4aeaa24ce145eccea0114e4d
SHA512252e79056db3fe142c1642cf6b8e7fb822aeaf17187caa70d58ab079b77ce02c6d80333beb53dafd1d4bcaf39954fb799fcaa5ba58814466823aa04a01df54ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e5950aa30265e698ae0a8f27996237
SHA1b73f2a41a05a66fdddde480eb5579b7f7b846484
SHA256ce18048197419117184b55ea7572cd2e703b2562ce15ded3e73ba084e21d019b
SHA51203414e9965d89759b6119fba4b93286059adf3dd13b95075a627d25e3694ff1521eb348ff5b4b182b3d39a0ef79c3d81b770589b582e1a1503558269fc500ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a36e226f5232a751539905d44ade94b
SHA1e3e1297aca5a9d009e575816309e43603c2ed4cf
SHA256532131ea99b9e0065cabeda3ee10e1cd51c97769ecff2b63c9e04e4eefddec01
SHA512e491139cada94d8a552de57cc6085f4c194aeb40c1b1d4221f69d2386bf0c4e0ec222e66d2d6259b8946bae6b05888117f2bf20ad11fbb19d445c48f6e8c6257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7a1f081184579afcb1a1bab45e9a36e
SHA15bc98ac85b432eaaf8f687dbdf0f7c821ac7d937
SHA256098b418b463b272fd7e4fab48793cd1e7eaf49cb280731bc9af87bfc8fc15de4
SHA51246d30eef1b131e7c63c99c98d5fddda23979f4968d0a24807f8b919523fbb352a656fc1768b96e39035aa57c3bb7d0b2bbb59c6739745b810e1dc122b6420fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4c1a8e45dc7540f563d12991f88d47c
SHA14db751763d468bb1576b8a2acdd78ce01e293dfd
SHA25601657e175289252cd957571c6d8b406ac71217d56d4b84f68733f552d2e69351
SHA512d42edbf494b99e0c76c4724b9e54520643e3b61cd8e5e7b5a0a56a1a505ba01633991dce4ae14fb96d3f862c979f2f1faf780ba207d84f5d3441d6b1e86c4a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5b0149b94a901cd3617c6da36c66d38
SHA1d963231d956f40c96e93243b659e19096d1b44b5
SHA25693d7c69c05a88376901062faa65b76cb99589df00665c1d8b5f6f649f300ce10
SHA512bad1b3c6ed057dd389389d9d1dc5529d9dc0e439c1c7cab045a4e576aa136b96f091b198ff5b4b40791e6cf3660fee934e9b4cc8596c603249b2f9af22c34641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dd09f5431ae4849e2cc83e8b515e99c
SHA1b35d768110c3295cad24b8ab9cd05b41ddf1b2ac
SHA25611186a25bcd87f2243b7caed8ce6df8d184dcac4c26bce25ff12e5d01e7bba6d
SHA5123f0439a4f8ac54f56906a7f220b1ae047254a541ac9f0ab34b14fe248409f3fb57fcf0154754a7c0987b39e22e3ad73156db27880e6d24281a60704f17421df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58269558ed0df15fdccdd4665c3b8ec60
SHA17cc4fbf3a934ace51ee2692a82c468ad0650b265
SHA25683f5d9bf8530471bef7c610b8f70a60e2ec9237b585b696831689281fadf91ec
SHA5125165e73550815652437a41fd58bb33297521088c057ce58c2fc76bd70901212e9dc7e1f84a47e08ecde2ec012b0afb174580b7f0ed4510b96076396544226db6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a25259ca8857781c2470eee12e5edb94
SHA1d00a0b0c6aa96edcc58a619ec233decf82ae4af8
SHA256d631f759b97e8389404988065f84cbd99ef61d017adeb494fc39af94a0aa4585
SHA5129f1093d99e0f6fd289c80e30253e06f17f8686b295e2db048a7bc2a783aae62da5183d961e494fd220e11c149930f189c983b5a80395c76552bd63422a146bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf58fc036bf55b5e0f7bdc9a653e4418
SHA17ecb83bedfc2cf6d38d32daff4bf77e790506e5c
SHA256b7af4138fbcbbd4e0e5722142cb6562946344f4e4a123d30a174a5c87fd5ed0c
SHA512181f70492341274ed3bd43070381e9a7ff2e8be88c63cd0e6a30e6c2836b5d026e7f5e4597f0a72a220aea307968c209db87fb86360e9f9742c12f59cb4811a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ba6e38c9cbf31f930646d7e05088de0
SHA1ebcecfd32e6803d19b7a52519b956ecea99ef086
SHA2567c7e90b97fdfc49c249c29c5e7ba62e7aaaef48d2e0298c6e09c1bc48acbf7b8
SHA512e6326ac57904a99dda2776d7b6492cf29e3a903662cefe3367cde6533f932dd6ed231a06478c80a43fa9b37b73750819fc7ad9c84d0fc7df7ad23e86680604f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56078015528d5ebde9a16c5850f0e1840
SHA14d092a87d27a9c4467f9441b854524dca3e56d9b
SHA2564139bf85bfa2ffd5b595828e062043388552dee8ab62dce140d105765ee533fe
SHA512d75308380388b6783d8adcec306706ac38ae05eb2b0968dc96942a94a5927765a7f71b1f59801e3f27fa61df908b90a0e6622eec0cd0ba79d1eb9b7c669040b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d19b1db459f90c9c93f7a35d1910cb0
SHA18d7d622df7dc618da9ee5756df96a50721033de5
SHA256d21d1196a1c9f95f0dd0a539818cadc952a2a237e7c41bc9a7215b007203a646
SHA512f7e4d77e5efb85103177e6bdb3cb0acf1a273480a889058d6a254082fe8b606093e58a1c918b58ffcc813ef05b21ebcfe66e3deec13ae9a2b7db659726504937
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b