Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
ffffae0b9c5ccc928d87ea79213733a7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffffae0b9c5ccc928d87ea79213733a7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ffffae0b9c5ccc928d87ea79213733a7_JaffaCakes118.html
-
Size
135KB
-
MD5
ffffae0b9c5ccc928d87ea79213733a7
-
SHA1
e44f11ae5d7fd0fa37da242b238a369697be95e7
-
SHA256
7cf1e7ed6d84d93bc229d360c3ea3aa59da896febce5c5cd563c53d3d2b27c1f
-
SHA512
c68be6cb7f7ec263116bce19e4816e915866b7d17da33e8d2a6d050aaf8830dc6ffa8ee27a616c97ae20b76b074473047cbdbe19846b5763df34691a56adde2f
-
SSDEEP
1536:SyayLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsn:S5yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2870E071-7EE7-11EF-B8EC-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433833543" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000eea6e4a7cad2b922e99d73a111a7e3ee89a2d8a72469fbfb95c5cea239608218000000000e80000000020000200000000521ea9f36e09d41ced2e5e93662045ea401d7b656a3a14d12181c75ea1748372000000052d87aa7d214e57ca1b44a243981875d7c29cb33846b5a92ed737f4c1ee5b0ca40000000e914aef867bfee1b458302eda34be440801d755ef240658accaf1e71018e01516c7ae9a08ddaea3f3258d7bcb8c9f9eee7fffb3bed1d233b5c6cae09df8e2efc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 807470fdf312db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2628 iexplore.exe 2628 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2652 2628 iexplore.exe 30 PID 2628 wrote to memory of 2652 2628 iexplore.exe 30 PID 2628 wrote to memory of 2652 2628 iexplore.exe 30 PID 2628 wrote to memory of 2652 2628 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffffae0b9c5ccc928d87ea79213733a7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2628 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a4db829cf1e3770bb15f524b5a81cde
SHA1efbcf11b541bf436ad74203cdeed57fd599ff00c
SHA25630916f939bc493b76d9498911c88486f616d289be6773c7aac0c3d2348ea08b3
SHA5128252dd23c61b6a0b29202e5f387d900b3d3576591fd37ca9c7f3bf4fe05739255f3d8c251e8a33736e519f2f141ebb133ad3e92dec0ea450ce53fedff974719a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1c8b1c27a62a6f6b3b6689bb6a437cf
SHA1e0907ff431e38985ba42dba80c302c83c2a92b41
SHA256539017bb35338af2da788bcc467db81abbf5c682b91f3007776dd4aad08132db
SHA51267eb28c54999a4acb32662ad5299971cde5d662d0e9369b734b9eab882a2146755f173083fa104e8638febd5e238b53550e8f91fad5ed1113bb72b1b8f98bf84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505eca6eb91910b09888439c97a845ff1
SHA183769fe08895fcf06fd4b956ada4fc9a851449b6
SHA25651e370ba07ee2e0f371a7a926d9a0961a9bcad342fc03ec716fc883a9a36f0bd
SHA5128193cb344eacfb62b840365a3e37b993c77793f716ceb8de8437364a23854f8af0b75ec62e6ebcced3b481593acec01b4be3e05c9e4d6587ef7b63ecf03077de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cde78b8bd35c9de750815570ed2d454
SHA119a7580fdbf2f43186645cf0c72fd3ec27bc020b
SHA256871decb269498718106d19843d01d5b60e78a78d77a81695b2dff71c14dca352
SHA5120fe6c7f52db33c8b87e492a380dea85396078cd415dff4fb73b97d2fc75aeb771216ee33d5d782528b6a880a0d11184e67de0e988539b93477cd866808cae48a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572d609de6814cfa8b8680407b9d78c0a
SHA17387e782caa7199efb8c098080e504d37fe05272
SHA2562ead2a69c0aa5c153b789fe6c927ebe62ed1bab59ca94fbacdfd087edf4a568c
SHA512a3d18f3fcd0e28aa969fe285382c67a01b20196ae31321e2a8f87af657a44d2f00b82310b8ad35f51762bd225aeb25606cee10f2013f23365bee11887db1ff23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e54f68270c9bc2b29ffa656ebcceced7
SHA13bc006e42554503806a9fb625fcf18c69c55edcd
SHA25680aae64d3a4e92ba1d7bde0d0c560fa8667685abef8eccdccad9b105162d42e0
SHA512c1e17de89e3b2ac098e189e188f4bf747d925d0cdbf08f94931510a4cc0e70b14be47df7170bbad79d607837c9e566ca0bb47d552c56dce1e5136e12305f7f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52461ff4bed6a9516a3e99715a7acda37
SHA1458c9f4bca94421856caada18441f2838f94e738
SHA2565f629983893d6ae33824fd52554c4c8d345582ee826d100aa5b4d58a161bb7b7
SHA51231a557c1081ddcd287924c471687033d8e9386be73fa105217299e9a9793ea4ca84f9adec66f1dd562dfa9fa4d6420e636123c2228be437fc7d63b4171b1a243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5891cbc65d95d2918f4c7255efe3e9d70
SHA1c3ebffc63b4fb2da9890b92e72ace56cdf1950cd
SHA2568e662ec0287da10c62057e28fcd9e8decb918554f6513cb5245088391e4dcc05
SHA512b05d117ca82723359de5491c8d4ddfb04cb3c50bc5941d32ffc89b0f43138ed0dc0bae702ea6e6c0809d6c130f346858033f55bd0c74b3c1afab548840d57f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b84f895e1fe34c83ad5c3b7e3322cd
SHA1720b847d1a6e3a1a08fff0a9cf2c9b160f46c401
SHA2563ddde7d6a1be7fc83c72afbca44150b8dc9a1884aeda9084304a97d9dcb6b969
SHA51235139fcb3af7b1adab7c5a2304267069ac7444395d9ed1810c66e4d654bd46b0f0c9c726cb9dc58b38b33d86fdb804bf6ba0f3cbf0f051d7c14b73af3fd0f659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bba261ae62ee3fba2e082d877acc194b
SHA1d16412b65b25ef71f391dbc39546349bed74fb88
SHA256f4771e41dc9a5a26c434b035486dbf5761a52eac470439bde305836bfe7a842a
SHA512dafffa318234f0486fb79a556c3257c6af692912b756cfb4cc09ca93ef1208c77868a1223842c68e2f5bcef39efa8b1e59fae2f6d12d0531a20495765b3bee5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5800c1672eed0b7d6dc8d5291ab4fa18e
SHA1710b450c06c25e2d3867e5f55d9e8fd9eb1be6d9
SHA2564e57bb4b06d269925807075a11edd89c61f87636065aa365b702a193fccc8dd0
SHA512c15521072685af0bab0abd74fff8aa0a23a42135fd3ba57c64dce66f96af43f4c6059101f4fccb5e52f132e80144d6a437853f191dbff9efb1f9de996fc05e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5268fc5a1f7d62a4b62a128b9ab692eaa
SHA19985a3c21af07d64c6c99b55a15fa3f84cf77f5d
SHA2564899afc7a04baa0805381dd3ff4410d612f83fefb72bb4ce1dc2e2f0aa6af79e
SHA51218e8ffdbc1d74664905a7a79f490109e2a1213ab9dc818596dacc6637bd58a73cb27c527002146e6c929ea65c047cd5700549ee9f30517b816e77fec3e5329c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560bb94de1d3ce05edc10118dd377db87
SHA183ce2906bf3cae9a64804b0775dabbab46d69057
SHA256b4bffb2ffab5ffc333f4160e91872a065359caa804df24c09dce596e431be587
SHA512123245d6650316bf67f5720895840ecb86e2b1a9aeebb3b407dbd1c2cb9c68e56e2c7a8e527cbb39761f8148d73c1380a55701980bfa6526803d5a8412c87154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8883292d74ffdd2ee6672e2183e3205
SHA158c8faf6932ee12e0f99fda240c7ad932fbc7aaf
SHA2567eed7dc3de9fe77f3fca62d0476b1b446180d40d6580362ac023b30ea617a6fa
SHA512c67a905f7a31e0404150a3ceaef76a544a1655be0f66d7547b4c51b73e4f085ef63aff5d448c9cf8138d9f17095cbc5b9383b4271810e55b8d99a08eaa28b486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4eb68f38331b1e5698c340fd9ca1bd9
SHA1f3ba0579864069a8233e651b8058f6f3d69978a6
SHA256c2e6d682689fb8b74852e375e30b7debd315c2296471363dfe3f518b3c268a4a
SHA5120ca57312041fcbeac8ca0ca15827d780275614ff37ee9ffd45b7128af716629e1771288b8e93f4521149db4e1b0ea350ea20b28604a59ddb9422fc28f60b7faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5c6e0ff57f5ea1153cc6407b46419bf
SHA18f1d7d0571e6991975aadbcb31d6bdcc17900dad
SHA256f22e5a0ff27f75f509096a02af85600224710005e447ddf0c797a6e2afbd9cd7
SHA512eada4c5bac65c6280eac834573f4ef0b0e582d1a851a733d1e83e1d5955db21f5ca0657bb9378e0db85c878d6f81602c291d4aa158a357b404092780899bbf95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d553d58af0dc096d996436178aa35e6
SHA11b2c88371eb75bf3aa809f3fd836d69e7d223713
SHA256058eb52625ed63e937be0ddf84b65e1c7c25984d9199358d88e5b4219dccc85d
SHA51202d3be8c12f7452f96df4d3fe489afedb2f537d0965936cdb7596925cd135556e094eba8a24c86662992d7e720b2118263b188e2fddb93b4a4286f71518841e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532f0cef3485529f97ccc3d33f97f96d6
SHA163cc5b5571a8ee2e284a8b8cf3c30b6732553122
SHA256722e40c49360d63221d18dcb387fbb23b6561e4d88c43ad5d3cd69acd9bc32c1
SHA512602d9a217aab7d3535722677bc921d548c6fb629558873281aa79b6024295e7c12c2aab84db7faac14eeb5afd33159891353575e4411534fcb0fd3377b99b235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c85060992fac1a9314dbf02d9dc9b90a
SHA1a584808d5d60ac9dfdb4a559fe99ee7b99ab0714
SHA256f674ed35c1395ea2e224c49f103a4a76032a6029e5511625f70cde642dddf33e
SHA5127f40156b54afb4a579f907b2c6d5afb61ba83b212535c655f8a0a74c24b46fb186279f4108b0f2edfde0e205ce178353e2014a1ff489c2844c5a91f39c723dc1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b