Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
e0f15dd780d41894815fb710f1675c8a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0f15dd780d41894815fb710f1675c8a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e0f15dd780d41894815fb710f1675c8a_JaffaCakes118.html
-
Size
5KB
-
MD5
e0f15dd780d41894815fb710f1675c8a
-
SHA1
8d32a3a69e66f99e49ddacc6d1b76f4426b70ed9
-
SHA256
430f0d0a3589cfd4717dc70f94ef0211d31a5ee7237dcf7c05e3f7572d17462e
-
SHA512
c5adab0bddb4ec1054cbc667b45c7abcdbd7bb09290f0f03aa2ab24419e3b7693a68ad9a007bd9e8721d18b04266009f438aa7132687d4a4ac72a9bad8c4bcde
-
SSDEEP
96:81+Y3WyDndnIKUcD/w4sdfBP1KQiF0+2aGrffq3fq8fqGfF5OTEPKq7+DBe5XSDA:JY3dwvKBFPQ6NDF5ByBUSP0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432506387" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b09c05f7e106db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000df5dfecb920f99a75880bbf1590a6de3d3dd45494a0e431609ed343e9c3a9a93000000000e800000000200002000000053ea9c46f27c1ad603984d62fb8b9a488eb681aaffb13aa14d5f3a5671a336e320000000edcc24be800e2bfe45198bcca16655c52596a47d1581c05b87666d796a080490400000000d22620cd72d3ac69e5351156de01118ce2796739fa9e16b081f7a7ca7790ab9febe71e839188478a7ef3e0b3bf5dcd07649f883fadf2272be2482f750d9f7ce iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000c0ef740e189995e6f78c201db9b669aa24c5175306ca1434c1d4f200460b58c7000000000e8000000002000020000000c528191770da54563f2e39adc37b11d1c298a76d9e955ab9c452d53cbc8fb7a290000000ae1d99478889295aa9ed6cb8680b976d4bb648b9a3895c0a5cd2f326201b386e00d142507dc620f298a64f06b4bcf698bae046b893d0c531db179fa9b4f4b29506eb7cbb7843b82c902b54221defe87cc0b4d38a84b63db23492c3abfaf67bdc7c3c5d3e30caf522d635f51b71662248156d8d12acac92b3f8e22c7d471f3baa8be542173241f79d812080602000b42b40000000e17feec6b49a39ba00eb920d94de71585223b25719ecb4c4a011ca64bcab1bd2a18847718d36eed8267aa3ba80e6bb05b4295e5710361b7aec3aae02e1f79afb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{226E2111-72D5-11EF-9CB9-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1960 iexplore.exe 1960 iexplore.exe 1548 IEXPLORE.EXE 1548 IEXPLORE.EXE 1548 IEXPLORE.EXE 1548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1548 1960 iexplore.exe 30 PID 1960 wrote to memory of 1548 1960 iexplore.exe 30 PID 1960 wrote to memory of 1548 1960 iexplore.exe 30 PID 1960 wrote to memory of 1548 1960 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0f15dd780d41894815fb710f1675c8a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a02ade7bc4b4af675b2be18b0f3a0805
SHA16cb2e47831d266390c90dd81371e6f9316b411a2
SHA256e6666cc5b301ed58775253de933235448cc4f521035e1093f4e62210d4923a68
SHA5129810e2001220280f8dbd6d37c8138e8a810a8060921e0f0d0940b76ee0aa0ae2883308ee7a645c264e30e0a013cfcc94e17a59c7418bf94a75d2e1600191148c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570cdaa6dd6401088968217cfae8805e7
SHA1fef6bc3b70a895b5564113d2c670c56193defc44
SHA25662bd875c116c817e6866487d10a03c34ffb21538e91b8f468b533438d1aeb34e
SHA5123752ab5d10ab7f2adde5f43b9a4f1e6f0783d69f86579200a5dfa4e9402d1ca5981e916950357525053e86b86e4c8620929dbf8fcb1acee4d01047c6501be0ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e94916642e90c5a1d705587f288cedbb
SHA1097ea57ebea26617b1c2ce09ae92a3dd408d4628
SHA25633a4377201e739687936f96fe49f5def49b7a7d21f36349cf8fab6fb479bd3cb
SHA5126a6ee69166b5f6bab531b5ea1cf67cc52f2e412fc19a3bd9c6c3b4d6ead88b068accf8da25a6e40fb55bf70cd4b76cef44e4e54355af72d7af337d315d6e8199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3caecb9437b9d13e02bf0e1a8f513b3
SHA180affe3e2dd1b2cfafd54029703219d3055bd13b
SHA256dd460b0980e240c1060c9c1b41cb183b4bab9beae86b25cddf7f3d0fd780fea6
SHA5129a29a5d4f3fc5073073459e19fa0770b0c9c30578ac97b1bf1d5ee519bb5c84e729a39727951f1acd568b29ad47747ee12d45ac0d0176495aca5069ea34c71a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a6f79d2f9ef5d3e1da45248cc74ea75
SHA185e0ad3f12fa6a369c70473aeb75bfbab1f57894
SHA256c9d111e7d9eb73b5181624da418f769959e11ef538f79e9d58762057dd1678c8
SHA512a1cdaa904ea32dc9e9f46de8652cf41f22bfe11e3c12a17120e7a1375dd88edd9d1e1a45805ea1cf97cbac939451e6630f6d9877df7e0ec724962e8858bd9e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a9301eced4bc37e75a6e9072a600d3
SHA109f5037b05884f788ebb78e8b97b9d50aa9f93b0
SHA256cea705242f10bab2655e7d00111e9279a837197d2be7dc3da3726e98f826422c
SHA5123e35e9a73a4d0b2260e19c955f13702731fc3a905f6cd5113b9bf01400703d49b59da4d0f9f7601eceffae5fb551bfc212f387458788f5ecd5aa77c4cdc46ee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571fe4635d4fd7f02df7208a83321c5f6
SHA108e2a92a9f3398ee45f18d903db5167502e0efac
SHA256d1d9dfa1b6c43c7fa7a5dbe1595f53cad4b11e693d3aa756c19f9a67f242b7e5
SHA51218a5d3a7eddd00f5ecc61df1b350ed3a3cd81e9422586449f5c3c0b4238baa97b2b89c6daa0e6e0cffd005ada71d3a92ff9683edb49fc0727d683c77f0f62186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b28b910a049d681c8d9456b787811a7
SHA1cd1492960654ca8770fdddf6261fa0dc300c928f
SHA256f70a42ba727021bc17dd29e8d6d0f1b56069d0ab8ad419ffa741cdf800d70dff
SHA5121e3f1b1cd36977726d70a1f55c6cfa747b3ae37fed3ad8f287665c58ead83f22237a148ac4e143ce42c745dd66a5c82487195ba452047c64b992718e7cdaaf63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e98aeddb2d498bdb1ff28f58f34e263c
SHA1af00669f33172000b245e2ff096be06a0b29e876
SHA256643c455f9eb27d8da016758e4d9d20cc68c209b1396d2a11e2aa73a216d0a2d5
SHA512cfa8bd86538bb9b20d07e8d57c1d8658f49d094bb83d61801cf78d16d078b2bd5db5c8a5ee0b4d2b661c041c467929983f7178d81527cae076f579c66a66eb2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fec08220eb8741564db77fbf9ba0da3
SHA1337c046f7b152e1279b3b382e2e85f6a28a9f5eb
SHA25642ee7375c44983d5a6c9ae551278ea0bcb37af38ad0453dc5ae5580531f0fe70
SHA5129e3055157065018ffbe8c3fb5ffa1ca735c2af0159470e65e46a565a2da955740bc821e851ac385ad9827ea8f0bd56f0be4984a13e2564ae8c95739fae212dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0cc7d413cd14680f7ccecdc05fc37ab
SHA16934d16b1985ce485f846a5e5340faeb36841448
SHA256439e32dd44c448a06923894ac5e267e6efe4b10368280b3c38dc3a4795ba9562
SHA512750446841fed3aa34ec62937b20786ef2e9ced1a86e1d6123aac0df79221f8f9dfd55b11c7129496c3c8fa0d05434c2947b52e4efba5383041a977382c56f209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5736401c1096d68892a29dd386a6d2aed
SHA16df2200f75d194c5c416672d3c573b7883c410b8
SHA25628e75902876fce7a55aeb31fe972e5ffad68ae2d141d5147f8e0e508fb8c49e2
SHA5124be9c4640cb1d1680b835b0ff0d115f31e282a14ec0c472b5a961096144c8977664ab9ee89174786df68f25114d593a21cde57d51a50ff0e1a840bc735bc83ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5072bf57bb30588336711d08f70158ba7
SHA120da0604c1bc2710cdf9fadc69a3abb0de4e586c
SHA2563f7ca5a3ed67fa2bfa8a0482a359114e0ef7a3a7e7d60f925c4d4f67e29b32b6
SHA512a09b11fe8156c7d864e60750464f20aba6917f5763e42d195f7cd7292ae611b0df5b7c1f417e8adf255d05082bcdd068f1742881082ee1a94e415eb252903504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed313da54b0a4519ca03f6eeac29d38c
SHA1a77797c1d864e43da4d764a6a31173f2ab4f7bb5
SHA2565b96fe4c289bf44603f6fe2c4d618df04a0befd2f75ba581e3c8044d3684910f
SHA512ca39fd05f4ea52c783a6c2e4cd3ff31de34166bd7feaa427c8309e1624cb725af4177e31b3b75f670f6c1c0d3a7ee0c878810faacfc6d9968293cabf38f8f901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e4c01492758cb46dec95f73f3167b14
SHA16e6a897de5c391c4266ad8c9ef9dfd4212c17227
SHA2567b828ac0575da4ac8e2868a888bdac6401d07e11314b608c61cd6323df8841e6
SHA5120dbc7fe7bc078dca4757a3a817014da8205245856a12f492b6a53b04f70ddebf2b3ecd69de9830d44b2834574c5189fd3efd4d05e951a7883adbb13fa0859707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dc31259f5cddcacb69ba614dee47bc6
SHA134d1cf70cfeb4630e24b8c4960ad0d4453a737e7
SHA256f9548d373e8c268661f4d884f1b31c8c9209f2a0339335e7c26b9e705a768502
SHA5125c88cafcd501b4710db575116d7d494b6bd2ff0887bdbca153f91947716d6944de64a8a90efb9120976fa8cf751bb7a845ce7a3142f57c81e300643a0c204a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3669b44ff6e8d0287598131629ff59c
SHA1200e5cd2a6e5730249bf4c87f3df2149305a6b40
SHA256d193441bc73d93c4ce373cd48cbf98d4fdef6543a8c923ce6ab6dab2c88a549b
SHA5127aa8b28699f3cac3597a253fe3e7f967427c102fe9eaa7972397cb2d765078518ec83e599742ecfd40fad6ec02271fbcaa372069a95eb78a911ec3cd2399a3a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab4f6ce9b4ab7ec9ac2b41f27cabd059
SHA128ccba23fd516ed12281a563fc9b58acbf864e44
SHA256e169ad8bceb1f9badcdef73bc2e84e25a2dd46e27dd52a937010f2003d367641
SHA5125643c0ae4cbf99c7d908f9bcfefb174689cff54e1a204b0a1e6e57349cb53c3ef8bfc99a5847770deb42056eefefad760b4086280bcbf3bf165527b1c8488db9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a54054751b25e2bfb7b7d76cba3a62
SHA185c235a4d9ac71eab66668fcccf77ab6fa3d628a
SHA256aca250349635389fd543eff6f066774f09277afcf0148eb2c21cbe0a040699c4
SHA512caadd84e2701d87a984ac947f21824cf339e79b7ae116825ed73f486d02b4e58fec579f1e650412229a1704e241e02bfd247e8561fd83d281a188d48833e47b5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b