Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
a9e245ceedd665a566cbc69e6a678e94_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a9e245ceedd665a566cbc69e6a678e94_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a9e245ceedd665a566cbc69e6a678e94_JaffaCakes118.html
-
Size
463KB
-
MD5
a9e245ceedd665a566cbc69e6a678e94
-
SHA1
6ee3f47870be618e48848a31f5bd52e98106da25
-
SHA256
e6e98e668829adaab73fc58d66eacb6f108ba1e0bd3786dfe537e3afdcb74f1a
-
SHA512
9deb56456f9c879a00f9e7709a29b1d713fa0932e5694151aa5862896471c73b2745a19c19799ffb12c0ae78b682da44b72be13e05e6f5966a724b98c3a1f623
-
SSDEEP
6144:S5sMYod+X3oI+Y5QrsMYod+X3oI+YvsMYod+X3oI+YLsMYod+X3oI+YQ:k5d+X3a5d+X3d5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0a15feb5dbeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000685d6a5693dd6682dbbb55b4a9abe5d27032b715daae2b6fced90bbeb243b59c000000000e80000000020000200000000c56031c832a5532de6692e719c0e3bc27fc315925c819da7ca175c681b256a1200000009ac0e1c2cacb41dcf103bc5bc4a90c53ed3804ab62107fc8ee3cdef63ac8818b400000000b0144101fe0f4315c87b9bd4e0673fcc0b9c8fd481f913575e95a062047800c323b7f44ad0c8dcdf681cfe450af82028c574f4cbc10e193e5014edfe2e499b8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000002c5f382aad0394f241f2f74011dde193e832bfe907fafd095523672d6be42625000000000e800000000200002000000068b701aa069c155713adc4d26013bca9b0fd9f9ad7417f6c5a2418c726b5634690000000f80da4ce115a1993d84c794cfb8287553d60f6e50f858e089c6d1666c1433af734e77330fa7ff38af668d1814b6e5a6defc6daa9b329b3802ee8f995b1252236ed777416146d6313aa70858bc5cea6e47004ad79242a9ef27335ea096d8124324d6f9a3bef33a95844a0dd24497ad723a69e35541a9704ad5de8783b9c8bb87727b51c38025d34e04db30d422435ad15400000008f61c3a2e7cdd2021bb49ce5131a53bce9a9d4e57b8d400c410a47a36f86278a9a4c5f868416bd46a2ba23bc174a5b0a066b82080bdda86b79082e97512f581f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424533185" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{127AE441-2A51-11EF-AB87-5E4DB530A215} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3004 iexplore.exe 3004 iexplore.exe 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2588 3004 iexplore.exe 28 PID 3004 wrote to memory of 2588 3004 iexplore.exe 28 PID 3004 wrote to memory of 2588 3004 iexplore.exe 28 PID 3004 wrote to memory of 2588 3004 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a9e245ceedd665a566cbc69e6a678e94_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9a0acde00bd06854d365cf9edc4f0f7
SHA177e301de4adc8c8d599b8899af7ce0765a33b618
SHA256195d05d7b40a39b60151bd106ac8645324a77ed8eddf598ecef79daee788eb43
SHA5122b7dc5745448fa24140ecfcc1501e3f84edcc37469afc73a8043496f5ace4978a7f14c47119bc2542d74d380cb42fcfd4a4692fbe530234697e887cdfc95a75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b3e20485be679a24c62d50e09fb656f
SHA10cddb5810f36c69c870e322cddbc1d1243686b1c
SHA25677e796a75cf339dfb2e286167a629ebc7fcd835e2d7e455ab6741dfa26bcbdee
SHA5120a2a823729350d119ae0f7fa89b9d6bd8485d82ab817d9b07abbfe303cb1c9511aec5d0292ae12916b4297dbf495070ae34469bbd0e455487657dd3bdee8f707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffb586b1f61ce7124ddb1286ee2f8119
SHA170d3009aaa281141903375e8f0bd97cb4ad54b78
SHA256e53badc8c12a0814747a5737c8349494591f9be2b8176a287f2b9338406f726f
SHA5126e9a925326c5e61c0984fffcae00feae8cccf60c9f0145f2deac52528ba01737a6d0a211fc9f907e1f8528e7ee16e47425f62fb571afab58ded37a16700589c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4277745f560b2942a0f4c81e17894b9
SHA17597bc6f2d51eef12f0aac55a91975b82c54ea84
SHA25657a9b60a16ec51e6438e4ccd4f7ab9096b5abebe645f2d2aa17d30aaf4c5a097
SHA5129fc64ee720301ce4fccf01ae99c1b8044ce8f19453ee08d8b3ab06e67c7baf6a85a8cab591332dd688535f7a3594f072d7ec5ff7a3653635e1649024a9051f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57417621a2acf8230c40bc9a0515ea77b
SHA189e47c2af74ad924fd4a788f25858b9240368ea4
SHA256ba6be69d456c10dac4f1952c337aefc6895fbf96e9b62ade9e7b29da0c76414c
SHA5122dcceaf7fb35da900bdb1299542ba6315970392eb741aeb5584d582905e48ea090dd815fb326f1e296a4d895505989f2befbaed4070bd9d9000e3ea8806e8c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b78a2db88a4251583f4457cd562a70f
SHA1d09a5d69249b03990f73bbc5e4ad75879359259a
SHA256c3069a66f14d4ab83a9fb50d40801d4c1af4b553ab92f42bbbd298936a4e3b4b
SHA512baaf0ff7efa9e580843f098377c0a92497dc20a2f74b49546e52fe66f91429f58d18df7f88e74380ab137a3033f62adae0cf01ab73780bab26716a04a9df6e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f62fd1854ffe38456075e448052a7d2
SHA13ab0063246c8a91f12c2e6ac3b81345c89518389
SHA256286da79a722445085f4d79d8f398790b8d579b51e823c29de210fda029bf6a7a
SHA512b42887453d684e1e4840c2b30c432b33de09db3138b7ce08849946e50b270ec4e848e2e1a970bda988a2eca5d21a00da855edf7cdb52154565818a367e2d1d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c80f5af37fee6937b79eff75e2c3414a
SHA1afd902cacc1b3562db6bd3368028496ff6041228
SHA2569f970290c885bb870990f95d0ee386d6c06f25258167ded0fbaa74528239aaaa
SHA5121f355a241c0396ed126d4cd87896256af15ccf9db0846b7c2be15cd1117247052f63784ae25d251f0cd9114525063142828694b0f08dc6f6777fac2b57d08128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577f3f85835873505152c72de32daad30
SHA1467ebe4bbf461c74aed891db4c5151448d6b4a90
SHA256d35860bf12f6261d1b1591e0603d2210bd40364565e1c2d90ae2f42611b50ae2
SHA512b254167538afb1f221fd4b130e590b5a6305049c7e67ef79146446a212d5d0f734eca4719e7360df5411c4291135c041c67df83c699a450a96834a14b43fb420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bd2e8bae5664a98ac69a174ae49c37a
SHA1fdcbc7d035782f2269c45d5af374b755b69d6d4b
SHA2561f62ac98f6ce12b7e84ba82b0cb2a9418d56550c65f707c0a8a695c46c651e59
SHA512e5d69493e12b92b316133db5031387eb2d3c03666c14d866f5704ee318ded489a9717160879a3bfc4c485e90de66b2ab06320ea6a2e23ed38e7728acaf16d80e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e08968f59d9fdc93a2073f32d1bce116
SHA124244dd5c04cd5d26ec2b69072c3e1c486a21fd7
SHA2566ca46e911f5902989cfcfc51acdfbb8dbb2c5d0245177c434d26680cdcf78521
SHA5127eb26ae6d6adb1c09acf902148dd2668b683c09c0d611bfdb9314dfa5d31e67a9260f7500006e8069c98cfe3a1ffb4dfdcbd1cfe75d7481d3ec4a8e03162bfa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54567776ee90742961b219ebec64653b7
SHA1148252d5a35e80836d4efd1babc34f29f08faf6b
SHA256f8da8ab14f7aff9b6419df4ba2b24b824a6a769937aee81719b88691dcd542a7
SHA51242f9ad6639a17d1aa062b5b05282c24afd1b8eacd9d336236c82bd2881c4ba8991e08f03e4b991ba0295d456d2f5aced8c7834528a11f117d55a7ebb59003f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a328c66d5266cc8eba2057c567a114d
SHA12e9f06b1ec0cb30bb49666c7fc5a228aabd10fd7
SHA2567fca79e43ee4e7a28a545e1fc1de19779d2a7a88754b15b3febff5cf4c309035
SHA512c96ea5b2f6af3518fa3586fcc7bb61e2976bf292a50050be64d0a1eebf8bddb02d0bee829a322aa73d368097c326519d9a7297a7d7d4002aee7009ea2776d838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f1a6ec0d92ae8568de275bfe4c302db
SHA12ce3ce47e7d4e5cd68b64455278f47ce20eac6b7
SHA2568b3f8f9fc6aabe149d284a70ddee67e21bfa2b877629d776d4d1941333af614b
SHA512db95cb244c7e0aeebbfc6430a4eb64ff9cace6f0f77c9388014fefad2eff9ba4a40d5aebc37e698d707e3b367a928ca37d1449faade87a37969dcf75b48554eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de25894b6af00252778c0d6414545a56
SHA14a16de16ab00d4464b5f48a577255a7d432373a4
SHA25699153df353763faa407e375b8641a2394e2c44b947bc68ac1da3b16f9376bcbe
SHA512fc15540cd3a76b2dba7e6cc18c7f156cc3502033516b2a78c73825eb8aaa17344c21a2a9e38e23796211c3c13b90063e773b463cd45dd9aeb58ac86d2e873f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3badd7c7bf6028d8eea0e6d98faeaaa
SHA10146657fd2fe5842c9f4f7bdbc6667ca61589105
SHA2569557750a8723f9cef24ee6245328133b99f1eb4c160f852a3e42a21582afc594
SHA512ff145153940241666d42b6b1f287e63a9c21bcf68e088f8003f58d4ace267c72942bd65a0162433f12746e91d25cccbcbf5aa222004ca3f5a300ecf16387701d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de02ac018fe036bf5f2a784ed93453b0
SHA160de7efdd66315f162ec5796a31ae5c37ea59356
SHA2562fc3272dab863d21232faf8a37ae99d0edb17e5f15a3d86ed261a3e4c0624b32
SHA5123f88fdb6ce238d242617665bfba4bcc9cb1a83bbb414cbf229bd49b70bbfd7264164a9a732eb618bc1ed7f2f931808fe553ed37a5c5d32ca3d582c435430573b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58165eb63f3c50f314753f634780e0b77
SHA14a7603c0e74b8bb0aef21640e1b43643262b037a
SHA2560dc38b16b69f45f9acdc63df03d4731501d35058199118aae18173b884d56402
SHA512e53657a38e3e5c6e337af82c4bd2b382882f5655c1f58990f4f8178ed96e0c50cedf98e331ca3e99eaf417e28530a627374d58b983fc85f61ad773e38b6fb3e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d4fc1fe1dc5d6dc04e6db35ea5c8bc
SHA12d13cdbdbd68c658298dd1057596a390983c9fe4
SHA256263b6da1e791389c256ab477040f31faac6c0eb23fd55a3122d8ec746a912b52
SHA512c97db7779b5a186e0020c5e2a3f07de1b8321302bf14d2c2a227a3c8bb3bc63f10c587f5275910f01c1c8d39e837274babf3ff00c428bd99762693278e0f7e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b37746038712c75ad5134cf16ad161
SHA121b9b2a8f5285c56b3118fde5711aef835fa6a95
SHA2568c580febf85f8b1181a83fb9f1a21eef7eb515e342736e5909e8e31c0948b7d6
SHA51294a811b8ba63770088b11b33d44407150bca402b5ea495dff9bc3c1384a48caf44f163d4f97a7e42fc8c31e28f67288569fffe47ba6bb72a42f5cf9ab582f3a9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b