Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
d137db71498517e87a91a30c69fb3cff_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d137db71498517e87a91a30c69fb3cff_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d137db71498517e87a91a30c69fb3cff_JaffaCakes118.html
-
Size
120KB
-
MD5
d137db71498517e87a91a30c69fb3cff
-
SHA1
3dfef6edee71e27359865a3d880cb3820dfcd0cd
-
SHA256
21d04153a7bf11771b4b73b69e16beeff47327b3d83a0b1ddcbe59fafafe5072
-
SHA512
6d344d7947930a24a39c3663b3dea7136a4e1eae2c917c598f8892a64c1bcfae8a176e1e30d8a561808afb6295ad6ad28d2a58294b468c13e8246865a82d868e
-
SSDEEP
1536:nEqiyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCW:nLiyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000090ab2c0d2419f8e4816bbed5bc24fbbee099bff9b7c2d7f35de8955952528c84000000000e8000000002000020000000914ee1998a369fad2219bde1f28131d4fb5d273e29464cf098e47cfae798bb0b20000000311aa783fce65cba7a0d698e9490a24b00ada6db8245c839028aa59171ab641940000000bcd650bfda79b2e2febb22913803d7be92de0b7260f90fad52e00043572931a9eaa3ed64fb5375e3536b5d7f763547008b904d8a058824239ac1dfa55a38caf9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431850161" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3CAB1D11-6CDD-11EF-BD1D-D238DC34531D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0253f11ea00db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2900 2876 iexplore.exe 30 PID 2876 wrote to memory of 2900 2876 iexplore.exe 30 PID 2876 wrote to memory of 2900 2876 iexplore.exe 30 PID 2876 wrote to memory of 2900 2876 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d137db71498517e87a91a30c69fb3cff_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6c61b88c1ae6fbb27f10b9959759ef1
SHA1b6f4fe8fa05b69f93706863cab21e6cf2947da29
SHA256ec2066aa99d4c085f5bf6f6d3ec8756af0e98ecd8aabb839adc97cf0c4bf07cc
SHA51278ef80fbec41dbfecb37f785c9a12029de4412905b6bf2593c74f7a85bb83aac60921814b3b5aba5aff42f75bfb9f1792bbbdf021a2d78e049729e003da6812d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5969773f874ac02aaf0eae14b3a7b34da
SHA16e64c8c62d98bf38ce3144c9098804f1e91be2b1
SHA256712a4b172d6026ae2ed36c95195bf8dd4e17faab001732a7ea719906e4708126
SHA512a10d9a6e91833bc6ab1c07ef3836086fa983fb84a477a24987df351b50f151ae6a3f1417d53e8a27547c9ea23a3647cfc284e6fd35070ef0c895922a293186e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd969793fcb7a47eeed81d25d8150f88
SHA146a092461dd8acc0f1e5d35fc0cf9a40f3e7a2f1
SHA2567e105c7133dce7ccf132273110a1cf6d4f12e50d7d168d83e6a2716cea58c61f
SHA51226c13b0a8a8b39b9eb1638f58e0fd68593a66abe5a67a34698a4cfa01b01e28ac1e3a59efc5b0b64fbae0c18a7359e366c587040d1e9d5de3d3ca232252e66a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57807bba38c619091d59de7b66599359a
SHA16748c0571aa13fc37e553ed91173c2aa93eded35
SHA256c389be926e2e0c8cd4293518060504b0b5f28c288903dabe0cb69cea9c84e698
SHA512da29cc283021a4884e058c8c57bd122d863d071f62fec5314548e9da373e92491def8d6a76d2153ffb15b7b17b9c88c83360a77ddc3df5f236ee249225dad3b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5178cc2c251c5e68d682e2bf53dd4aca4
SHA198099ea67ce7014038b811c9bb4fa54e4a6dc7ad
SHA25631164db8b9edf6dcf0682baeb7c711aad077a2190d2cc7a3d6b86f1a621d075f
SHA5120469ea2f3d98100af1b674c15a6a6968e57c93812e1628df747641e7c36574919c92bd589692cd96608e249f956a8f3989168cbc933481a9b65946999e925eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5151d4a1df72ed32ee380643818d5d6fc
SHA1bc33fccb33626cbf9a49e1a5d43b8a3c5de13aa1
SHA25646a4f4cbc1415fb66f1800401b3fbbf117cc95d25dd1c42cfbbf8b10232abb4e
SHA5129f083c92a398f00c66c0a61e8a8a84d13a5eecffb2c7fbbf2a6ce8fcf0a8602bcae76d18b2c646a588ffcaffbc6ad2406c961b98cf14267c0ad1612c7fae9fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac15e7f895accc6ddc12f52e8a4accf1
SHA1fefd29252763fd55d780e32a77caeed59643f83a
SHA2563a4bdbf6444190c28fe9bc65a8fb9340ce103205153adcccfc16f22ca01db8b3
SHA5125d2feb34f30641e0a301df3e60d994f349f7921e46c7c73ffd9a9681d210eed3593ce8b5631cca771d38f2e8aacd88a451c951b93b9acb569bd8f75e37e22433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab2a1ecaf531ba8b5df63dc452418bca
SHA106401680887c5efd2b124b61c916b0310c091724
SHA256591d67db016a59c835af79660397b2914ab3f46b2cb6d3ae4422ec2be9a83742
SHA512973475da14d10441cde360b3c62d412c5b7c8779b30e156ed2050c121a2a145b22ae1b0b6d0443c7f82019a3e08617ad5437b42783dd4768694e0cdc950b7f17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc15a4e575c2ccb4fea1e0cdc93e45bb
SHA1fe303c4193c70677a9b70002a1ef8564cc4e8314
SHA25679d74029d38e6f7b2133fe7a478b942ba8dac2143b8acf92f7ddbff8c1aa25cc
SHA5122953671954db08c406ef5d831b476932cf32f77178645cb432b1c8c08283a24315a71ac4beec73ff85fa22cd48e4ac67d2f84a5405a15812ef9b7c610102d89b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ba4037c6be758bf00381d6769dbb435
SHA1fb5336e4c20f0abb07b731ad86d1b25228698603
SHA256a43ebf76c6f7f329258649d1e286a141bf4f46fa0bd51747734bf6c42e7f7597
SHA512e6333bd2636b826276cbab7afed7574f7398ef518136ffcddb4a1da92515401747d9eeaad46fcbc2f4a590017d6499b151f306f16580819804e2d15c39cca1c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa6d30467c45113cb99b2af16a3707b9
SHA11fe4b6e98afc0daac30c2db5663a2504d7fb039f
SHA256ea27b5c274995c40bee4e7dc4529443a4ff08923a3647a56065b5140d08af4d2
SHA512dbaff7c84f0fee6a71b49162bd54f59010e6ea89f9c97605c2ec2592c426bd89c284c43ba323a70b115d9bd20737d74d74628bfeb53d7abce772526e33d42168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c12b9ee8828a469f16f0e772065eeda0
SHA10ba3e453a4112c232383bac54f7999b2f0460c00
SHA25658d19abf77c1564706318b0fe46ce8b825e935f6dead9b810ad4b63c34eb4243
SHA5122353251ea7ffc1d4296a59c599ea61f1311b441ee608e8aa9e8154bdc37087317281fc7c9f3ad4566c5795b325538381ff989d968b9c599889141171198ad7b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539216595a832e9169f01032498778e43
SHA19cf7c4e902aec2041e9b9f7702a42a7c7cbbfb53
SHA256e9dc4a71550cb607df6bf1c643fb3f43bd70456faaa319753a57328e292a6a86
SHA512016c86f5947637f8c30f1153bc3ff321e41ad5c9339119b8d491acaec3a570c4844237365a73998ad05afe2ab28739697cebe7845cad6b52cc70d2d19a1c8429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5788c29d99a637741c3558e8739cff703
SHA184a5b213a53abef23f8bb4561418d2d2e153fa17
SHA256d812010443a62e01701a0e7580795386f821c71dcce286a2cc9c5749190f8bd8
SHA512b32098bf859a03408d0f6d680a4079a524bffc5a0418a74a107e765581b4e79861e21bfc3138aeb2cd08233c6f32a664f21136e91754866cebee33bf26421bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc73cf592e437b22c3ad35b84bc8c83b
SHA1efc0518d4b4a47b3eadb22dcdf7bbe837a013111
SHA25658b2449d60ed5748a4cdeaf4f62331753c1fedcd685785e6cf0d4dfbef8cde0b
SHA512bbe16bb9612357c05e295a7761cba0073a69631b02007e89884c39f0157f0965f018007e3c9583ce20135cd412a9cb04f6991c39ecabd7bd5301680d3460adb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582e61077dfa604db4f4edab3116c650c
SHA1732170ea456344934aa7dc6c364fd29d666e1e4a
SHA25653a9de931823d92f9a043fa837a4c9af5d80e5c3f9540f3dac46784527084ab3
SHA512363f4c391bd87780f7c47233a961b69dde09ebd4cd394e7beaa2d56417b72ef1268feb2e26c09d1b3afacafbaab587224bc6870b7483c88a5b249dd24464bf1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510317043aef7a270301d6fc5140396f2
SHA1faff5af34dd4422e19c092ed3d90b252b02a69dc
SHA256ba29a197e2d26a13bc34f95c84300f7b053c5bd1599fda50e8293ac3d3ff0ff0
SHA5125184200c4623ad1074926e37d1eb1dd6aee15c5d98a8271df74d9898516d11bb6018ba5128e53ee18956ea63a21fa5cce42d4ab4ff3c85418b6357776d9dc028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506408e4d046e5512e92aaa495b5b1bb0
SHA145fe71c0e4356987294fa15388d61728d7597328
SHA256d79c989a252fae6add7e3a39de34dd5805afc1d7bb8840f8b8d25168843691e8
SHA512a4c121415d3618911c9ab3fc55b7a360b4d083118fc007a42dcdbb0a129a34090089a00e5809d8b86c4312cfa5670b4983c22253caabf3596625c05e1d91efb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a31d8b95764f87f634dcc676fe194cf
SHA169464ed119d85c3d99d83dd3bf6c9f42bf9a5540
SHA2569c56f1472ebeaa2a4fa028e5c87d2b4dc38c3f1a41cc331b98b70fe37388d3bc
SHA51224399cb8f96396397ac6254af7b759288237bd01511dc3e21c32b0b10f7246e2dfdbe66b8c8a4933dbfbf67bf0df256f577f3c9467093bb382398dc613791708
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b