Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 12:40
Static task
static1
Behavioral task
behavioral1
Sample
e27ff63e8e5a034c03e806fef576ad62_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e27ff63e8e5a034c03e806fef576ad62_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e27ff63e8e5a034c03e806fef576ad62_JaffaCakes118.html
-
Size
140KB
-
MD5
e27ff63e8e5a034c03e806fef576ad62
-
SHA1
162262f510a656ee15e6bba21608f72b7af09e8f
-
SHA256
b6d5745894a5fa16bb06caa31bdb47be43542fdf97cb7f55f861ecb97df2b0ed
-
SHA512
09672a3ad07c6cc0263300b4e2769e371a06fabbb16c68b5735dbd6c6787de556a71e135b13939770fd90da464ad719c748dd6369966165a9576fd4bc079478f
-
SSDEEP
1536:ScI9VhdRqlAnDkLaIkhyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:Scg9UlihyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000e70dde452ccc70e3e2b2f253e5989d1724246db46e097aea94b29387f4b0b490000000000e8000000002000020000000b12f213c5f1e94291faeb47dab308e65df521e36b21c1b4cb33daf313068daa9200000002c2a383d529f8122eabc744abcfe64b54abdb094c26426db000bb4ea7237820940000000edd092a1bc8c3fe5b53b93fa7e1ffe003ffab986ccdf6ede46623a2dc1ed8c6067706aa570136cedff33bee7563456fd837959be0c8585f2e344cd2c270fc0ac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A40A79A1-735F-11EF-9D33-D6FE44FD4752} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432565876" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a050f7946c07db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2760 2280 iexplore.exe 30 PID 2280 wrote to memory of 2760 2280 iexplore.exe 30 PID 2280 wrote to memory of 2760 2280 iexplore.exe 30 PID 2280 wrote to memory of 2760 2280 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e27ff63e8e5a034c03e806fef576ad62_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548300ba70848ad5666a1f58cb1d19936
SHA1b17e42d56f0c115ccc7d3dbfb0ff719d31dee229
SHA2566253a6291d0fc9f11d9fc61a84ed75eede1c3563ccf4fc31a306030f616ab978
SHA5124bb1f06ce51b1d75b4a0f7aef3a3895c3bcdf2adb1a2379e42e48ac0d1277754e3508c94eaf5202a8ffb0420e0d2eb2e6519a3ad1791328c912f768b9dbbe556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5892cf14a7bae9dfafefed1812e6125b5
SHA10cb99da8f4f16fa1e37e45eb7a86d729c5852574
SHA256dc432febffed31e17efcc1eb72b6b1ca78a2f4ac51bcd0513fe8808ef661743f
SHA512bad30f8edbca4988df5c3da6d098f2faffac9cc82f485d43c76ca8b5a025e6147d62a22f4fd43c4cc5631b22fafbc04cf7695fa9513825ae1070dfda9fb3855d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579608786f1d4c09e10232aed7fd8160e
SHA19675823d20fe4eac1f492a5965cc459cadb08294
SHA2567152e43932e7cb50614a35eaaa09a12212534e9e6d310869916bca5cfd90acaf
SHA5129d51f82c575f66a1ef961415278fcd953370162c897fb0873ac5ef69d55aa33f00d3143bb4ffd76e829958bc708974f5bc13fa13d20b7f305addabe37350059f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f52ab1984434d5cdd2f271d1616c4671
SHA111b28a2bf78ebe9908753c3870c70069f4d88c8c
SHA256cd2293a8499c46fcca0d6359bb4a3404ee5022a88304df023d8d9226bf163ddc
SHA5120fdddd3df8b007209cb2f9b077797bf563eac9a703af8aa62b6b6b7b21d1f8da9e184a572e4916e534cefafb64f49ef3264d929320249572eea16d542bb201d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591bd37926a0b3d984f8cbcc32c5cc7ad
SHA1bea9d7b819232b6ca759619e84582361ab93f3ff
SHA256c6ec40d70bde1ea4ef4d47ba413c4155ef9e2381d6345084d11b78bab502f210
SHA5124f5e55195f3446af591a8364dd8d8ce5a76b3bbd1ac758ec36904ceff1f63338438e8ef5559821f55a57fdd83d3be20d3b88ffab2008bdb2f56a6204492651f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e8f92ac7589a2af93579654a3da891b
SHA1589d1dc5e9476f1ba70f911fdf42d16c4e66990f
SHA256f961f67b056cf10b816679c477160e87bf8ddadd898f288620cd3fd96da3a62b
SHA512ec98123d511e1a1cf8391d62e3096e2884c76bbd09c9f16a513a4452170196327357257da9ec0f1461d986db311c004e11ea99f27824ea41924f70d226671840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c09042788fca7f9953df4da14860f86
SHA1425fa85034d7ebe438c30f8e543adf2d4905c20b
SHA2560b295b86d810f7315f1da7d69c53532c41085f2491732b2741dd148056412b9a
SHA512e4a7423638efe27536e82ae56c37d324102f3002064f9443c38d939c1d86d223257515c6e2e1b75c4de59dafcd501a6b6c1c9966e7a733109fb43801d73bfe5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c43e33e432c48b04f1ac70d1c27813b
SHA1c61cc60326e2d8690bfae75cf21849f8f200b121
SHA256f81d3d43679734b35f35eb3a310d66e9fb7edc911827f7b61c9ab47263b3235d
SHA5123f14252b7cc964b38f5d91dacc64a6b12ff36ed3005524493054344bd035e030b2d106c20274a4319412bf09704c42b5fc2fb0f5eee15dba1aba564777cb239b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539a4db29fc8ac9b8de043654dd488f7a
SHA10b31aac3d1fb7e6bade9a3505ef3370a011c6e67
SHA256750dfa0ce6e210b2d666fc9d265247f9e1184b42b5011dbdd669736d7bab69d7
SHA5120f4e8a718cc6ee4424b91c5b137dd9916abe5204774b1ad0d1f67cc0a30300632539b4e61489bedff24de79d5700e07b3898f857d3c95d6fe7b0d1017ca44a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f167f45c8063380e69716efca1bfa2
SHA19135e3b0dde799f63273962a1de34ea264cb4b73
SHA25652a14932c3144ab86fb218a3c0c392b0a17d841ae24c107d4a0c5deb50f5acef
SHA512c81ec208ca28e41923410d9f5ab619617cc9b4e6b4d186552045867f6132accc74fdb001fd25e46d9b038e704b122bcbaac3495c26f8a222135f956d86fe5f37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5effe92985c47289492f14ce59e764603
SHA14080928ad68c3240db358c7a900edbd4c7620734
SHA2562647835d236314619086d6616efbce372f2dc4d3b9b1120738d5ed92dc162cd4
SHA5128bf15cad7bc8f0115fefc2837994a4baf6ba3232391b67379ab619022a69f187fb596afcdbcb62613862b2df888479f9ebb96179ce148e42400e3bea1da01cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514953e8fc2947b4f6cb42062b0073a9e
SHA1c1f5de4957a5e82148e42e5c43911e6f0ac0820d
SHA25608fff0d13a3471c3e8b2c3da7f792ec03fcc2e11fd17aadf6591370be78e455d
SHA512d8cad076d8602e99b4bdbef1d79cc612f1649d3578212efdcb9765ad31dce5739460ae1c1d3d83154f181b1fb2fbd975a568c1af665bb5b71de05d674e507f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c4a4b4d6777a9fa850fc4b45456a25d
SHA16b7bb806ed1c523202e57060c7a0601eef219c8b
SHA2565185c9e3500c8a21957fc0dc5bab719d815ea75d35dd4327eb4d90ca8f35b774
SHA51280dffaed9057ee61d2f3a53389bff051d9a244686e7a0cd51b38101482413c764183b9cc9a1f56d9faa46532001b74065f5dcfd7d271514daea8f4f91c595e1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57470e6f25822156919f37340e746745a
SHA10c6f44b579c045c52fa18bcf4586c1157c3db547
SHA256f82d248d279f3227fe9fe50c4b907a6e62f6923d5df25f0d1bceebf31e2146b7
SHA5123ad8498f0e0675cd607957576573127a0c1804bd7ffdbf98f95abb4043c1776c5211008c03d74c3848a00d62a4c4b147fbde10c73422837ec3e1b5cf067f0a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5418c3d6fd33657736a1554ec7072b564
SHA1c401b87ed1c82dc5c0ec1e3b1e9565f9bb040f8b
SHA256ef1d7ccb7a8aec0150ca4cbadf557865e24eb9cf750f3e6fbd0978b7b91c82c3
SHA51231af235b62862a86fe2d5a0fd2fe3fa5f5c0bbc9390ff933423be763554c70f58f88c518278167d726d3b6795e0c3aa4d059bc90825cca3413452b333c25138a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb498ae4616d7b15ba0f3d3bfc4a9029
SHA16afb5f1d1fde1c979a189fdc094d5e844e653f11
SHA256d4b3076d892f762b32d430278f1027bcb71b011fb2c92ca63b98f956f2951453
SHA512a788a0eb79a3ead0694c424270b17961af836de43d8ecb380362fec09abdefc28af796ca6310da3307a7b897c5055c26efd6110cd82e03152f2e8458a6a78f58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba13451a8cfa13a96a800423a35e1d6c
SHA12e4cc5f9779b06e07bb03bcee7380ae56410074b
SHA25662322ec3694f9dd195b69a50f586d601babe91092cdc2474427f8b7c7c8faf77
SHA512a296b9105c3afef40c2d65b8aa9c92853b6f0743703b12d5349ce245bfc69ce5f7b08af4e87fb4578c506eac771d97ef6e2a3ddb114f58ffe731b3731b73753f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572c885dbcebef8d323f9b866d832519e
SHA1b32abca2bd47ec95660ccc77d836e1cb8ba5c062
SHA25655d8d85a7fd9e920c4c5a1810f221d1732b77038a12586f56bb0bab88235f699
SHA512a29ccff0b8d82ad49e05d1b8b6e3e3697d358495125d803d7b37d31beecf474379773bedbf2a16419de1077ab1c50846424f659db739f512ae2b2a8157baa3e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d2d3282c35ec73257e37bb61ecd2770
SHA1271e851c12649511a61cb60da531a25b98bdc10b
SHA2569017523c10ac9756b3744e7af15a70711bb7c2c78827e24279398ba77d0335bf
SHA51236f593bc976d3c3f2ca0b2619ebbf4e1345e4dd31b753cd5c41b8585b402f02780ea3a8409196d4e94c81bc859c6938c905da765d2085ef5ebde5d7f8a16dff8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b